Bullying, Cyberbullying & iPredator Educational Media

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Bullying, Cyberbullying & iPredator Discussion

On July 30, 2013 from 7:30-8:30pm EST, cyberbullying and internet safety expert, Michael Nuccitelli Psy.D., C.F.C., will be guest on the internet radio show, The Bully Proof Classroom with Host Jim Burns. As author of the Information Age Forensic construct, iPredator, Dr. Nuccitelli is a national expert on the major groups of online users who engage in nefarious and malevolent activities. The internet radio show provided in this post also is the same link to listen at a later time. Below Dr. Nuccitelli provides his definitions of Cyberbullying, and his new Information Age construct, iPredator.

Title: Bullying, Cyberbullying & iPredator

Guest: Michael Nuccitelli Psy.D., C.F.C. Tuesday, July 30, 2013 7/30/2013 7:30-8:30 pm EST

Call-Ins Welcome: (646) 595-4965 The Bully Proof Classroom with Host Jim Burns http://www.blogtalkradio.com/bullyproofclassroom/2013/07/30/bullying-cyberbullying-ipredator

(show archived at same link for listening at later time)

What is Cyberbullying

Cyberbullying is the act of directing threatening or disparaging information at a target child using Information and Communications Technology. Cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. As author of the Information Age Forensics construct, iPredator, and owner of the internet safety website, www.iPredator.co, Dr. Nuccitelli educates listeners on cyberstalking, cyberbullying and iPredator predation tactics.

10 Cyberbullying Tactics

1. Exclusion: Exclusion is a cyberbullying tactic that indirectly sends a provocative message to the target child that they are not included in social activities without the need for verbal deprecation. As it is well-known children and teens are developmentally fixated on being recognized by their peers, the process of designating who is a member of the peer group and who is not included can be devastating to the target child.

2. Flaming: Flaming is a term describing an online passionate argument that frequently includes profane or vulgar language, that typically occurs in public communication environments for peer bystanders to witness including discussion boards and groups, chat rooms and newsgroups. Flaming may have features of a normal message, but its intent if designed differently and flamers endeavor to assert their power or establish a position of dominance.

3. Outing: Outing is a cyberbullying tactic that includes the public display, posting, or forwarding of personal communication or images by the cyberbully personal to the target child. Outing becomes even more detrimental to the target child when the communications posted and displayed publicly contains sensitive personal information or images that are sexual in nature.

4. E-mail Threats and Dissemination: This is a cyberbully tactic used to inspire fear in the target child and then informing other members in the peer group of the alleged threat. The cyberbully sends a threatening e-mail to the target child and then forwards or copy & pastes the threatening message to others of the implied threat.

5. Harassment: Harassment is sending hurtful messages to the target child that is worded in a severe, persistent or pervasive manner causing the respondent undue concern. These threatening messages are hurtful, frequent and very serious.

6. Phishing: Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target child into revealing personal and/or financial information about themselves and/or their loved ones. Once the cyberbully acquires this information, they begin to access their profiles and purchasing unauthorized items with the target child’s or parents credit cards.

7. Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by digital technology. Cyberbullies impersonate the target child and make unpopular online comments on social networking sites and in chat rooms. Using impersonation, cyberbullies set up websites that include vitriolic information leading to the target child being ostracized or victimized in more classic bullying ways.

8. Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post or publish cruel rumors, gossip and untrue statements about a target child to intentionally damage their reputation or friendships. Also known as “dissing”, this cyberbullying method is a common element and layer involved in most all of the cyberbullying tactics listed.

9. E-mail and Cell Phone Image Dissemination: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged children. Children can receive images directly on their phones and then send them to everyone in their address books. Some children actually post these images on video sites, their social networking profiles and other programs for anyone to download or view.

10. Interactive Gaming Harassment: Interactive games on online gaming devices allow children to communicate by chat and live Internet phone with others they are matched with online. Having the ability to exchange information with gaming opponents and fellow peers, children will verbally abuse others, use threatening and profane language, lock others out of games, pass false information about others and depending on their computer savvy, hack into other children’s accounts.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Although the benefits of Information and Communications Technology far outweigh the detriments for society, humanity has been seduced by the illusory notion that more technology translates into a better quality of life.” Michael Nuccitelli, Psy.D. [2014]

ODDOR (Offline Distress Dictates Online Response)

“Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)

Title: Bullying, Cyberbullying & iPredator

Guest: Michael Nuccitelli Psy.D., C.F.C. Tuesday, July 30, 2013 7/30/2013 7:30-8:30 pm EST

Call-Ins Welcome: (646) 595-4965 The Bully Proof Classroom with Host Jim Burns http://www.blogtalkradio.com/bullyproofclassroom/2013/07/30/bullying-cyberbullying-ipredator

(show archived at same link for listening at later time)

“As Information and Communications Technology (ICT), social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. In 2013, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Dr. Internet Safety

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and primary caregivers about cyberbullying, cyber harassment, cyberstalking, online sexual predation, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts.

Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Troll Man vs. Cyber Tyger is an exceptional educational tool.

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Michael Nuccitelli, Psy.D. – iPredator Blog Talk Radio Interview

Michael Nuccitelli, Psy.D.

iPredator Blog Talk Radio Interview

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyberbullying, Cyberstalking & iPredator Discussion

On July 29, 2013 from 11-12 EST, cyberbullying, cyberstalking and internet safety expert, Michael Nuccitelli Psy.D., C.F.C., will be guest on the internet radio show, The Rich Simpson Show with host Rich Simpson. As author of the Information Age Forensic construct, iPredator, Dr. Nuccitelli is a national expert on the major groups of online users who engage in nefarious and malevolent activities. The internet radio show provided in this post also is the same link to listen at a later time. Below Dr. Nuccitelli provides his definitions of Cyberstalking, Cyberstalking and his new Information Age construct, iPredator.

Title: Cyberstalking, Cyberbullying & iPredator
Guest: Michael Nuccitelli Psy.D.
Monday, July 29, 2013 7/30/2013 11-12 pm EST
Call-Ins Welcome (646) 595-2404
http://www.blogtalkradio.com/rwsimpson4/2013/07/29/the-rich-simpson-show
The Rich Simpson Show with host Rich Simpson
(show archived at same link for listening at later time)

What is Cyberstalking

Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

Cyberbullying Prevention

Cyberbullying is the act of directing threatening or disparaging information at a target child using Information and Communications Technology. Cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. As author of the Information Age Forensics construct, iPredator, and owner of the internet safety website, www.iPredator.co, Dr. Nuccitelli educates listeners on cyberstalking, cyberbullying and iPredator predation tactics.

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Dark Psychology

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time.

It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic. Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

“Dark Psychology is both a human consciousness construct and study of the human condition as it relates to the psychological nature of people to prey upon others motivated by psychopathic, deviant or psychopathological criminal drives that lack purpose and general assumptions of instinctual drives, evolutionary biology and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology explores criminal, deviant and cybercriminal minds.” Michael Nuccitelli, Psy.D. [2006]

Title: Cyberstalking, Cyberbullying & iPredator
Guest: Michael Nuccitelli Psy.D.
Monday, July 29, 2013 7/30/2013 11-12 pm EST
Call-Ins Welcome (646) 595-2404
http://www.blogtalkradio.com/rwsimpson4/2013/07/29/the-rich-simpson-show
The Rich Simpson Show with host Rich Simpson
(show archived at same link for listening at later time)

“As Information and Communications Technology (ICT), social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. In 2013, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Michael Nuccitelli, Psy.D. – Cyberstalking & Baby Boomer Interview

 Michael Nuccitelli, Psy.D.

Cyberstalking & Baby Boomers

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyberstalking and Baby Boomers

Internet Safety Internet Radio Show

Title: Cyberstalking and Baby Boomers
Guest: Michael Nuccitelli Psy.D.
Wednesday, July 23, 2013 7/23/2013 11-12 EST
Call-Ins Welcome (646) 595-2404
The Rich Simpson Show with Host Rich Simpson
http://www.blogtalkradio.com/rwsimpson4/2013/07/23/the-rich-simpson-show
(show archived at same link for listening at later time)

On July 23, 2013 from 11-12 EST, cyberstalking and internet safety expert, Michael Nuccitelli Psy.D., C.F.C., will be guest on the internet radio show, The Rich Simpson Show with host Rich Simpson. As author of the Information Age Forensic construct, iPredator, Dr. Nuccitelli will educate listeners on why Baby Boomers, senior citizens and older adults are often targeted by cybercriminals and cyberstalkers. The link provided in the post also is the same link to listen at a later time. Below Dr. Nuccitelli provides his definitions of Cyberstalking, Baby Boomers & the Information Age.

Cyber Stalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands.

“Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available.”  Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)

The Baby Boomer Generation is generally defined as American men and women born between the years of 1946 and 1964. From a population standpoint, during these years roughly 75 million babies blessed the United States making up 40% of the total population. Given this tremendous societal feat of mass procreation, America seemed to be filled with confidence and optimism with prosperity for all being an inevitable outcome.

National Association of Baby Boomers: BabyBoomers.com

As Baby Boomers grew older, many of them began to fight for economic, political, social, economic and equal justice for the disadvantaged. Just as previous periods in history, Baby Boomers have walked through life witnessing some of history’s greatest events, accomplishments and tragedies. Some of these include the Cuban Missile Crisis, Vietnam War, Civil Rights, massive social change and the space program were just a few of the events they witnessed. Although technology, civil unrest and societal upheaval were commonplace during their young years, the Baby Boomers were never confronted, until recently, with a massive societal paradigm shift as children experience today in our rapidly expanding techno-centric world called the Information Age.

The Information Age is a societal paradigm and period beginning in the last quarter of the 20th century and presently thriving. The Information Age is a stage in societal and technological development similar to the Industrial Revolution (1750-1942). The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, ICT and its importance to humanity have led many to surmise that the planet and its human inhabitants are amidst an Information Revolution. Mobile device technology, telecommunications, social media and the abstract concept and artificial universe of cyberspace are just a few examples of humanities newest frontiers to obtain, exchange and disseminate information.

INTERNET RADIO SHOW ANNOUNCEMENT

Title: Cyberstalking and Baby Boomers
Guest: Michael Nuccitelli Psy.D.
Wednesday, July 23, 2013 7/23/2013 11-12 EST
Call-Ins Welcome (646) 595-2404
The Rich Simpson Show with Host Rich Simpson
http://www.blogtalkradio.com/rwsimpson4/2013/07/23/the-rich-simpson-show
(show archived at same link for listening at later time)

iPredator is a Global Internet Predator Construct

 “As Information and Communications Technology (ICT), social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. In 2013, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Help Stop Cyberstalking

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Dark Psychology, Sociopathy & iPredator Definitions

Dark Psychology, Sociopathy & iPredator Definitions

https://drinternetsafety.com/dark-psychology-sociopathy-ipredator/

iPredator Equals Dark Side of Cyberspace

Dark Psychology and iPredator are two psychodynamic and criminology constructs developed by NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D. Provided for interested parties below is Dr. Nuccitelli’s recently updated definitions. Dr. Nuccitelli is always receptive to discuss his two constructs and can be reached at drnucc@ipredatorinc.com or 347-871-2416.

Psychopath, Psychopathic & Dark Psychology

Dark Psychology posits we all have the capacity for predator behaviors and this potential has access to our thoughts, feelings and perceptions. We all have this potential, but only a few of us acts upon them. All of us have had thoughts and feelings at one time or another of wanting to behave in a brutal and violent manner. We all have had thoughts of wanting to hurt others severely without mercy. If you are honest with yourself, you will have to agree having had thoughts and feeling of wanting to commit heinous acts. Dark Psychology, similar to Criminal Psychology, attempts to examine these intrapsychic chasms of darkness.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D., iPredator Inc. (2013)

Sociopathy, Sociopathic & Malignant Sociopathy

Malignant Sociopathy: A sub-tenet of Dark Psychology, Malignant Sociopathy is defined as a rare and extreme form of classic sociopathy, does not suffer from an acute psychiatric mental illness, is predominantly driven by the need for absolute power and control and views the enslavement of their victim(s) as a priori as opposed to taking their life, engaging in sexual and/or violent victimization, stealing their valuables or causing them psychological distress.

The current accepted definition of sociopathy is a personality disordered person that exhibits patterned behavior similar Antisocial Personality Disorder, often criminal or deviant, and who lacks a sense of moral responsibility or social conscience, lacks the ability to establish meaningful personal relationships, extremely egocentric and narcissistic and frequently engages in fantasizing about wanting to victimize, torture and enslave a targeted victim(s). Malignant Sociopathy is the severe form of the classic sociopathy with minor, but significant variations.

Sociopathy Signs Bullet List

SOCIOPATHIC HALLMARKS
1. Lack of remorse, shame or guilt
2. Severe narcissism and grandiosity.
3. Does not recognize the rights of others.
4. Views people as targets, opportunities & objects.
5. Pathological liar and often talented at deception.
6. Capacity for criminal or entrepreneurial versatility.
7. Adept at being manipulative and conning.
TREATMENT/FANTASIES TOWARD VICTIMS
1. Fantasizes about or attempts to enslave of their victim(s).
2. Fantasizes about, attempts or succeeds at exercising control over every aspect of the victim’s life.
3. Highly dependent upon their victim’s affirmations (respect, gratitude and love.)
4. Fantasizes about and attempts to create a willing victim.
5. Alternates between rage/abuse and small expressions of love/approval.
6. Creates addictive cycles between themselves and the targeted victim.
7. Fantasizes about, attempts or succeeds at creating a sense of hopelessness in the targeted victim.
HOW THE SOCIOPATH LIVES A DOUBLE LIFE
1. Skilled at exhibiting superficial charm.
2. When in public, presents with a conventional appearance.
3. Depending on the situation, changes their image as needed to avoid prosecution.
4. Depending on social environment, changes the specifics of their life history.
5. Consistently secretive & tends to be mildly paranoid.
6. Excellent actors and blends in with their environment.
7. Pathological liars and masters at practicing deception.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Dark Psychology

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time.

It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic. Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

“Dark Psychology is both a human consciousness construct and study of the human condition as it relates to the psychological nature of people to prey upon others motivated by psychopathic, deviant or psychopathological criminal drives that lack purpose and general assumptions of instinctual drives, evolutionary biology and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology explores criminal, deviant and cybercriminal minds.” Michael Nuccitelli, Psy.D. [2006]

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Cyber Attack Prevention

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)  

Dark Psychology, Sociopathy & iPredator Definitions

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyberstalking Radio Show Links – Michael Nuccitelli, Psy.D.

Cyberstalking Radio Show Links

Michael Nuccitelli, Psy.D.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyberstalking Internet Radio Education

For those interested in learning about Cyberstalking, iPredator Inc. founder, Dr. Michael Nuccitelli, completed 3 three-internet radio interviews on the iPredator typology of Cyberstalkers. Dr. Nuccitelli thanks Rich Simpson, the host of The “Rich Simpson Show”, for recognizing the importance of discussing the rapid growth of cyberstalking, cyber harassment and what has been called the “Internet Troll”. Below is Dr. Nuccitelli’s definition of iPredator, Cyberstalking, Cyber Harassment, Cyberbullying and his sub-tenet to iPredator called Cyberstealth. Most important to American citizens, here is the link to check your states legal statutes on Cyberstalking and Cyber Harassment.

 What is Cyberstalking

Cyberstalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands.

What is Cyber Harassment

Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target. Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations devoid of the need to control, dominate or manipulate their target.

What is Cyberbullying

Cyberbullying: Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, deprecate & defame a targeted child. Cyberbullying describes threatening or disparaging information against a target child delivered through Information and Communications Technology (ICT.) Unlike classic bullying, cyberbullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy occurs when a cyberbully encourages or persuades others to engage in deprecating and harassing a target child.

A cyberbully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.

iPredator Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Cyberstealth Equals iPredator Favorite Tool

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth

Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Information Age Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. An example of Information Age Deception, not included in Cyberstealth, would be a young man who joins an online dating service and publishes in his dating profile that he if 6’0 feet tall when he is really 5’11.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cybercriminal Minds

Information Age Deception does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Information Age Deception can be as subtle of what many call a “white lie.” Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.

As the Internet naturally offers all ICT users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is IVI or iPredator Victim Intuition. By using Cyberstealth, an iPredator’s IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications.

iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.

iPredators Practice Cyberstealth

The iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator includes a general understanding of Cyberstealth used to engage in criminal or deviant acts or to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity. Often times, cyberbullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious, moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.

As stated above, Cyberstealth is a concept formulated along with iPredator used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of ICT that humanity often fails to fathom leading some ICT users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Pin It on Pinterest