National Bullying Prevention Month: Day IV

Oct 4, 2013 by

CYBERBULLYING TACTIC: eINTIMIDATION

4. eIntimidation: This is a cyberbully tactic used to inspire fear in the target child by communicating threats that may be direct or implied using email as the vehicle of communication. Upon emailing the target child their threat, the cyberbully also informs other members in the peer group of the alleged threat. The cyberbully sends a threatening e-mail to the target child and then forwards or copies and pastes the threatening message to others of the implied threat. If these threats directly or indirectly suggest physical harm, they move to the tactic of cyberstalking.

2014 Cyberbullying Tactics Images on Tumblr

http://ipredator.tumblr.com/

iPredator Inc. Cyberbullying Webpages

Cyberbullying Definition Overview

2014 Cyberbullying Tactics: How Cyberbullies Cyberbully

Cyberbullies: An Educator of Educators Approach

 

iPredator: Information Age Forensics Construct Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

 

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

 

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

 

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

 

 

Cyberbullying Assessment, Education & Training Tools

Note to Readers: To encourage a public discussion on cyberbullying and other iPredator typologies, Michael Nuccitelli Psy.D., founder of iPredator Inc., will personally email, at no cost, any of his tools in exchange for an objective review about the internet safety tool(s) or his Information Age Forensics construct, iPredator. Given the creative nature of cyber criminals and the Dark Side of Cyberspace, interested parties must first speak with Dr. Nuccitelli via telephone. He can be reached at 347-871-2416 or via email at drnucc@ipredatorinc.com

Cyberbullying Abuser Checklist [CBAC]

Cyberbullying Abuser Checklist (CBAC): The CBAC is a 75-item educational and diagnostic cyber risk assessment for parents, teachers and pediatric professionals regarding a child’s risk of engaging in cyberbullying themed behaviors. The CBAC investigates and/or educates children on their vulnerability and risk potential of engaging in cyberbullying leading to appropriate intervention measures. The CBAC is also an excellent training tool for professionals addressing cyberbullying prevention.

 

Cyberbullying Target Checklist [CBTC]

Cyberbullying Target Checklist (CBTC): The CBTC is a 75-item educational and diagnostic cyber risk assessment for parents, teachers and pediatric professionals regarding a child’s risk of being cyberbullied. The CBTC investigates and/or educates children on their vulnerability and risk potential of being by cyberbullied, harassed or defamed leading to appropriate intervention measures. The CBAC is also an excellent training tool for professionals addressing cyberbullying prevention.

 

iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]

iPredator Probability Inventory-Cyberbully Abuser (IPI-CBA): The IPI-CBA is a 110-question diagnostic and educational cyber risk assessment for investigating a child’s online probability and potential of cyberbullying other children. The IPI-CBA explores the child’s relationship to the internet, characteristics common to cyberbullies, environmental cues influencing their online activities and the behaviors necessary for appropriate online activities. The IPI-CBA is also an excellent training tool for professionals addressing cyberbullying prevention.

 

iPredator Probability Inventory-Cyberbully [IPI-CB]

iPredator Probability Inventory-Cyberbully (IPI-CB): The IPI-CB is a 110-question diagnostic and educational cyber risk assessment for investigating a child’s vulnerability of being cyberbullied. The IPI-CB focuses on the child’s relationship to the internet, their knowledge of nefarious users and their practice of behavioral actions necessary for internet safety and preparedness if attacked. The IPI-CB is also an excellent training tool for professionals addressing cyberbullying prevention.

 

Cyberbullying Abuser Checklist [Abridged]

Cyberbullying Abuser Checklist (Abridged): The CBAC-ABR is a 75-item educational & diagnostic risk assessment for evaluating a child’s risk of cyberbullying others. The CBAC-ABR investigates and/or educates children on the vulnerability and risk potential of engaging in cyberbullying leading to appropriate intervention measures. The CBAC-ABR is also an excellent training tool for professionals addressing cyberbullying prevention. The CBAC-ABR is less expensive and same tool as the full version CBAC, but does not include ongoing expert assistance and educational supplemental materials.

Cyberbullying Target Checklist [Abridged]

Cyberbullying Target Checklist (Abridged): The CBTC-ABR is a 75-item educational & diagnostic risk assessment for evaluating a child’s risk of being cyberbullied. The CBTC-ABR investigates and/or educates children on their vulnerability and risk potential of being by cyberbullied leading to appropriate intervention measures. The CBTC-ABR is also an excellent training tool for professionals addressing cyberbullying prevention. The CBTC-ABR is less expensive and same tool as the full version CBTC, but does not include ongoing expert assistance and educational supplemental materials.

Connect the Disconnected, Educate the Ignorant and Conquer the Corrupt.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. Their website, www.iPredator.co, offers site visitors an enormous database on Cyber Attack Prevention, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack risk prevention checklists and inventories (IISC & IPI Collections.) iPredator Inc. offers abridged versions (IISC Collections-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. (2013)

Print Friendly, PDF & Email

Related Posts

Tags

Share This

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.