Oct 9, 2013 by



9. Mobile Device Image Sharing: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged children. Children can receive images directly on their phones and then send them to everyone in their address books. Some children actually post these images on video sites, their social networking profiles and other programs for anyone to download or view. With the growth and widespread usage of mobile device technology, this cyberbullying tactic will become prevalent.


2014 Cyberbullying Tactics Images on Tumblr

iPredator Inc. Cyberbullying Webpages

Cyberbullying Definition Overview

2014 Cyberbullying Tactics: How Cyberbullies Cyberbully

Cyberbullies: An Educator of Educators Approach

iPredator: Information Age Forensics Construct Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbullycyberstalker, cyber harasser, cyber criminalonline sexual predatorcyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target. 

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberbullying Risk Assessments


Cyber Bully | Cyberbullying Target Checklist Abridged | iPredator

The CBTC-ABR is a 75-item cyber bully education and data collection tool for parents & educators regarding a child’s risk of being cyberbullied.


Cyberbullying | Cyber Bully Abuser Checklist-Abridged | iPredator

The CBAC-ABR is a 75-item cyber bully education and data collection tool for parents and educators regarding a child’s risk potential of being a cyberbully.


Cyberbully Risk Tool | Cyber Bully Target Checklist | iPredator

The Cyber Bully Target Checklist is a 75-item education & data collection tool for parents and educators regarding a child’s risk of being cyberbullied.


Cyberbullying Risk Tool | Cyber Bully Abuser Checklist | iPredator

The Cyber Bully Abuser Checklist is a 75-item internet safety tool designed for parents and educators regarding a child’s risk of being a cyberbully.


Cyberbully Target Tool | Cyber Bully Probability Inventory | iPredator

The IPI-CB is a 110 question cyberbully probability inventory designed to examine a child’s risks of being cyberbullied and cyber attacked. iPredator


Cyber Bully Risk Tool | Cyberbully Abuser Inventory | iPredator

The IPI-CBA is a 110 question diagnostic and education tool designed to examine a child’s risks of being a cyberbully abuser or bystander. iPredator Inc.

Connect the Disconnected, Educate the Ignorant and Conquer the Corrupt.


iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants. 

Dr. Nuccitelli can be reached at Their website,, offers site visitors an enormous database on Cyber Attack Prevention, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack risk prevention checklists and inventories (IISC & IPI Collections.) iPredator Inc. offers abridged versions (IISC Collections-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education. 

Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. (2013)