NATIONAL BULLYING PREVENTION MONTH: DAYS 6-8

Oct 8, 2013 by

CYBERBULLYING TACTIC: PHISHING

6. Phishing: Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target child into revealing personal and/or financial information about themselves and/or their loved ones. Once the cyberbully acquires this information, they begin to use the information to access their profiles if it may be the target child’s password. Phishing also includes purchasing unauthorized items with the target child’s or parents credit cards.

CYBERBULLYING TACTIC: IMPERSONATION

7. Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology. Cyberbullies impersonate the target child and make unpopular online comments on social networking sites, forums, message boards and in chat rooms. Using impersonation, cyberbullies also set up websites that include vitriolic information leading to the target child being ostracized or victimized in more classic bullying ways. Often times, the target child is unaware of these events until the tactic has been designed and implemented.

CYBERBULLYING TACTIC: DENIGRATION

8. Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target child to intentionally damage their reputation or friendships. Also known as “dissing”, this cyberbullying method is a common element and layer involved in most all of the cyberbullying tactics listed. The primary goal of Denigration is to humiliate & disparage the target child.

2014 Cyberbullying Tactics Images on Tumblr

http://ipredator.tumblr.com/

iPredator Inc. Cyberbullying Webpages

Cyberbullying Definition Overview

2014 Cyberbullying Tactics: How Cyberbullies Cyberbully

Cyberbullies: An Educator of Educators Approach

iPredator: Information Age Forensics Construct Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbullycyberstalker, cyber harasser, cyber criminalonline sexual predatorcyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

 

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target. 

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberbullying Assessment, Education & Training Tools

Cyberbullying Abuser Checklist [CBAC]

Cyberbullying Abuser Checklist (CBAC): The CBAC is a 75-item educational and diagnostic cyber risk assessment for parents, teachers and pediatric professionals regarding a child’s risk of engaging in cyberbullying themed behaviors. The CBAC investigates and/or educates children on their vulnerability and risk potential of engaging in cyberbullying leading to appropriate intervention measures. The CBAC is also an excellent training tool for professionals addressing cyberbullying prevention. 

Cyberbullying Target Checklist [CBTC]

Cyberbullying Target Checklist (CBTC): The CBTC is a 75-item educational and diagnostic cyber risk assessment for parents, teachers and pediatric professionals regarding a child’s risk of being cyberbullied. The CBTC investigates and/or educates children on their vulnerability and risk potential of being by cyberbullied, harassed or defamed leading to appropriate intervention measures. The CBAC is also an excellent training tool for professionals addressing cyberbullying prevention. 

iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]

iPredator Probability Inventory-Cyberbully Abuser (IPI-CBA): The IPI-CBA is a 110-question diagnostic and educational cyber risk assessment for investigating a child’s online probability and potential of cyberbullying other children. The IPI-CBA explores the child’s relationship to the internet, characteristics common to cyberbullies, environmental cues influencing their online activities and the behaviors necessary for appropriate online activities. The IPI-CBA is also an excellent training tool for professionals addressing cyberbullying prevention.

iPredator Probability Inventory-Cyberbully [IPI-CB]

iPredator Probability Inventory-Cyberbully (IPI-CB): The IPI-CB is a 110-question diagnostic and educational cyber risk assessment for investigating a child’s vulnerability of being cyberbullied. The IPI-CB focuses on the child’s relationship to the internet, their knowledge of nefarious users and their practice of behavioral actions necessary for internet safety and preparedness if attacked. The IPI-CB is also an excellent training tool for professionals addressing cyberbullying prevention. 

Cyberbullying Abuser Checklist [Abridged]

Cyberbullying Abuser Checklist (Abridged): The CBAC-ABR is a 75-item educational & diagnostic risk assessment for evaluating a child’s risk of cyberbullying others. The CBAC-ABR investigates and/or educates children on the vulnerability and risk potential of engaging in cyberbullying leading to appropriate intervention measures. The CBAC-ABR is also an excellent training tool for professionals addressing cyberbullying prevention. The CBAC-ABR is less expensive and same tool as the full version CBAC, but does not include ongoing expert assistance and educational supplemental materials.

Cyberbullying Target Checklist [Abridged]

Cyberbullying Target Checklist (Abridged): The CBTC-ABR is a 75-item educational & diagnostic risk assessment for evaluating a child’s risk of being cyberbullied. The CBTC-ABR investigates and/or educates children on their vulnerability and risk potential of being by cyberbullied leading to appropriate intervention measures. The CBTC-ABR is also an excellent training tool for professionals addressing cyberbullying prevention. The CBTC-ABR is less expensive and same tool as the full version CBTC, but does not include ongoing expert assistance and educational supplemental materials.

Connect the Disconnected, Educate the Ignorant and Conquer the Corrupt.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants. 

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. Their website, www.iPredator.co, offers site visitors an enormous database on Cyber Attack Prevention, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack risk prevention checklists and inventories (IISC & IPI Collections.) iPredator Inc. offers abridged versions (IISC Collections-Abridged) that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education. 

Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. (2013)