Cyber Attack Risk Tests & Exams

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

Internet Safety Tools

iPredator Inc. founder, Michael Nuccitelli, Psy.D., is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009]. Dr. Nuccitelli & iPredator Inc.’s goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

Provided for the reader are an overview of iPredator Inc.’s Internet Safety Tools. As with all consumers who purchase an iPredator Internet Safety Tool, Dr. Nuccitelli and iPredator Inc. are available, at no cost, for consultation. The iPredator Internet Safety Tool links and formal definitions of iPredator, iPredator Bridge, Cyberstealth & Information Age Forensics are as follows:

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

iPredator Internet Safety Tools

All iPredator Inc.’s internet safety tools were designed for diagnostics, data collection, investigation and education. The iPredator Internet Safety Tools were authored by Dr. Nuccitelli and a close group of fellow associates over the course of 10 months and several thousand hours. Each tool targets a specific group of online aggressors and targeted victims. Given the rapid growth of online assailants, these tools still stand alone as the only comprehensive, extensive and multi-functional assessments in the nation.

All of the iPredator Inc. checklist & inventory assessments have been designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC Collection checklists are for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI Collection inventories are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and ICT vulnerabilities.

After four years of extensive research and investigation into the criminological, forensic and psychological aspects of humanities interface with ICT, the iPredator Internet Safety Tools are the first step in iPredator Inc.’s mission to stop nefarious, abusive and criminal online users from victimizing children and citizens of the global internet community. Dr. Nuccitelli and his colleagues seek to educate and protect ICT users against cyberbullies, cyber harassers, cyberstalkers, cybercriminals, cyber terrorist, internet trolls, online sexual predators and those engaged in corporate disparagement, online deception and internet defamation.

Cyber Attack Risk Assessments Cost

$125.00-$150.00 (USD) 

New York USA: 347-871-2416

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

iPredator Internet Safety Checklists

[IISC Collection]

The IISC Collection are fourteen 75-330 statement checklists designed to verify a child, adult, or business’s ICT protection preparedness, online vulnerability and internet safety practices are effective [i.e. PISC, PCSC, TISC, AISC]. To verify and confirm the preparedness, vulnerability and capacity to endure from iPredator attacks for children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools investigating the typologies of iPredator including: cyber bullying [target and offender], cyber stalking, cybercrime and online sexual predators [i.e. CBAC, CBTC, CSPC, OPPC, CCPC].

To assess preparedness, prevention measures and the capacity to prevail from iPredator attacks on business’s regarding cybercrime, digital reputation, corporate disparagement and internet defamation issues, Dr. Nuccitelli developed data collection and diagnostic tools for corporate entities [i.e. BISC, DRPC]. To compile data and educate students, clients or patients regarding their internet protection preparedness, vulnerability, cyber attack prevention and capacity to prevail from iPredator attacks, Dr. Nuccitelli developed two diagnostic tools for educators and behavioral healthcare professionals [i.e. EISC, ISCP].

Cyber Attack Risk Tests & Exams-Michael Nuccitelli, Psy.D.

iPredator Internet Safety Inventories

[IPI Collection]

The IPI Inventory Collection is twelve 110-330 item four choice diagnostic inventories designed to assess and/or educate a child, adult, or business’s online protection, online vulnerability and internet safety measures for children, adolescents and adults [i.e. IPI-P, IPI-330, IPI-T, IPI-A]. To assess and/or educate internet  safety measures of children, adolescents and adults, Dr. Nuccitelli developed diagnostic and educational tools specific to the typologies of iPredator including cyberbullying [target and offender], cyberstalking, cybercrime and online sexual predators [i.e. IPI-CB, IPI-CBA, IPI-CS, IPI-C, IPI-IP].

To assess and/or educate internet safety practices on businesses regarding cybercrime, corporate disparagement and internet libel issues, Dr. Nuccitelli developed a diagnostic tool for corporate entities [i.e. IPI-B]. To assess, compile data and educate students, clients or patients regarding internet safety practices, Dr. Nuccitelli developed two diagnostic and educational tools for educators and behavioral healthcare professionals [i.e. IPI-E, IPI-PSY].

Although consumers must agree to a non-replication and commercial distribution license agreement, iPredator Inc. will work with, at no cost, assisting consumers in developing their own products and services commercial tools. iPredator Inc. is receptive to professional and organizational affiliations for the purposes of marketing and selling the IPI and IISC tools. Consumers who purchase any of the iPredator Internet Safety Tools have access to their authors for consultation and advice at no cost.

Please note that the IPI and IISC Collections were painstaking designed, but have not been validated via research methodology. Despite not being clinically confirmed as reliable and valid, iPredator Inc. is confident our tools are very effective. If verification is sought to those seeking to purchase a set of tools, iPredator Inc. can arrange contact with national forensic and educational organizations to verify their effectiveness.

Note: All iPredator Internet Safety Tool purchases are completed through the payment gateway PayPal.Interested parties contact Dr. Nuccitelli by phone, he emails the party an iPredator Inc. PayPal invoice, the party makes the payment via PayPal using a credit or debit card and then the party is emailed the iPredator Internet Safety Tool PDF file upon receipt of payment

Internet Safety Tools

Cyber Attack Risk Tests & Exams-Michael Nuccitelli, Psy.D.

Educator’s Internet Safety Checklist

[EISC]

Educator’s Internet Safety Checklist [EISC]: The Educator’s Internet Safety Checklist is a 330-item education, diagnostic and data collection tool for educators regarding a student’s preparedness and prevention of being cyberbullied, cyber harassed, cyberstalked, sexually solicited and/or victimized by iPredators. In addition to being a data collection tool and general educational template, the EISC can also be used as an adjunct to classroom projects, prevention education plans and educator training seminars on internet safety. The EISC is designed for educators and educational institutions working with children, adolescents and young adults ages 9-21. In addition to an educational tool, the EISC allows educators and pediatric professionals to engage in a dialogue with students in their online practices.

Teen Internet Safety Checklist

[TISC]

Teen Internet Safety Checklist [TISC]: The Teen Internet Safety Checklist [TISC] is a 100-item education, assessment and data collection tool designed for teachers, educators and pediatric professionals related to pre-pubescent and adolescent Internet safety and responsible Information and Communications Technology [ICT] usage. The TISC is formatted in a manner allowing the adolescent, an adult or both parties to complete the checklist. The TISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21. The goal of the TISC is to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment, cyberbullying or trolling for a target to sexually victimize.

Cyber Bully Target Checklist

[CBTC]

Cyber Bully Target Checklist [CBTC]: The Cyber Bully Target Checklist is a 75-item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent or adolescent’s vulnerability and risk potential of being targeted by a cyberbully. The CBTC verifies, queries and explores areas developmentally relevant to school aged children. The goal of the CBTC is to investigate & educate children on their vulnerability and risk potential of being targeted by a cyberbully engaged in teasing, taunting, harassment and disparagement of a target child using Information and Communications Technology [ICT]. Just as all the iPredator Internet safety Tools, the CBTC focuses on the child’s relationship to ICT and knowledge base related to cyberbullying.

Cyber Bullying Abuser Checklist

[CBAC]

Cyber Bully Abuser Checklist [CBAC]: The Cyber Bully Abuser Checklist is a 75 item education, assessment and data collection tool designed for parents, educators and pediatric professionals on a pre-pubescent or adolescent’s vulnerability and risk potential of being a cyberbully and/or engaging in cyber victimization of others. The CBAC queries and explores areas developmentally relevant to school aged children. The goal of the CBAC is to investigate & educate children on their vulnerability and risk potential of engaging in teasing, taunting, harassment and disparagement other children using Information and Communications Technology [ICT]. Just as all the iPredator Internet Safety Tools, the CBAC focuses on the child’s relationship to ICT and knowledge base related to cyberbullying.

 

Pediatric Internet Safety Checklist

[PISC]

Pediatric Internet Safety Checklist [PISC]: The Pediatric Internet Safety Checklist is a 100-item education, assessment and data collection tool designed for parents, educators and pediatric professionals on pre-pubescent and adolescent internet safety and responsible Information and Communications Technology [ICT] usage. The PISC queries and explores areas developmentally relevant to an early adolescent, adolescent and young adult, ages 11-21. The goal of the PISC is to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment, cyberbullying or trolling for a target to sexually victimize. Just as all the iPredator Internet Safety Tools, the PISC focuses on the child’s relationship to ICT and internet safety knowledge base.

Online Predator Prevention Checklist

[OPPC]

Online Predator Prevention Checklist [OPPC]: The Online Predator Prevention Checklist is a 100-item data collection & educational tool designed to educate and investigate a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance. Just as all the iPredator Internet safety Tools, the OPPC focuses on the child’s relationship to ICT, their knowledge base of online sexual predation and environmental aspects influencing their social media and online activities.

Parent Cyber Safety Checklist

[PCSC]

Parent Cyber Safety Checklist [PCSC]: The Parent Cyber Safety Checklist is a 330-item education, assessment and data collection checklist designed for parents and caregivers on their child’s internet safety and responsible Information and Communications Technology [ICT] usage. The PCSC is constructed for parents and primary caregivers to verify and confirm their child’s internet safety and cyber security practices are valid in preventing a cyber-attack by an online assailant. The PCSC also helps to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment, cyberbullying or trolling for a target to sexually victimize. The PCSC enables the parent to focus on their child’s internet safety practices.

Business Internet Safety Checklist

[BISC]

Business Internet Safety Checklist [BISC]: The Business Internet Safety Checklist [BISC] is a 100-item checklist designed for a business to verify, upgrade or monitor their Information and Communications Technology [ICT] safety and security practices. The BISC is a data collection tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors. Related to cybercrime specific areas, the BISC focuses the business on their cyber-security breach potential, digital reputation acumen and capacity to institute internet safety and cyber security strategies. The BISC is designed for using on a regular basis as part of a business’s internet safety and cyber security monitoring practices.

Cyber Stalker Identification Interview

[CSII]

Cyber Stalker Identification Interview [CSII]: The Cyber Stalker Identification Interview is a 75 question identity investigation and data collection tool designed to achieve a three-fold purpose. The functions include: I. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyberstalked and/or cyber harassed. II. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyberstalker. III. Assess the extent and skills of the cyberstalker’s tactics and the target’s online weaknesses and high-risk behaviors the cyberstalker is attacking. For purposes of the target vulnerability estimate the CSII queries, the CSII combines aspects of cyberstalking, cyber harassment and cyberbullying if the target is a minor.

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

Digital Reputation Protection Checklist

[DRPC]

Digital Reputation Protection Checklist [DRPC]: The Digital Reputation Protection Checklist is a 100-item checklist designed for an online user and/or their business to monitor, protect and manage their digital reputation. The DRPC focuses on the ICT user and the business’s cyber-security breach potential, digital reputation acumen and capacity to successfully institute online reputation prevention and online reputation management [ORM] strategies. The DRPC is a data collection & assessment tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors. Digital Reputation is a term used to describe the online reputation of an online user or business disseminated by other online users.

Cyber Crime Protection Checklist

[CCPC]

Cyber Crime Protection Checklist [CCPC]: The Cyber Crime Protection Checklist is a 100-item checklist designed for an Information and Communications Technology user, their loved ones or business to assess their vulnerability and online risk potential of being targeted. The CCPC assesses the probability of being disparaged, stolen from or infiltrated by online assailants, cyber terrorist or nefarious corporate competitors engaged in cybercriminal and/or cyber warfare activities. The CCPC also investigates personal and/or corporate vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cybercriminals, disgruntled past employees/customers or nefarious corporate competitors. Areas examined in the CCPC include identity theft potential, personal and financial information protection, ICT safety, cyber security and security breach potential.

Adult Internet Safety Checklist

[AISC]

Adult Internet Safety Checklist [AISC]: The Adult Internet Safety Checklist is a 100-item checklist designed for an adult Information and Communications Technology [ICT] user to verify, confirm and examine their ICT safety and security practices, online vulnerability, risk potential and cyber attack awareness. The AISC is also designed to investigate an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by iPredators based on their online activities and level of cautious approach. As a data collection tool, the AISC can be used to investigate an adult online user’s efforts of reducing their probability of being targeted, disparaged, stolen from or infiltrated by cyber criminals, cyberstalkers, online sexual predators or those engaged in digital reputation disparagement.

Cyber Stalking Prevention Checklist

[CSPC]

Cyber Stalking Prevention Checklist [CSPC]: The Cyber Stalking Prevention Checklist is a 100-item data collection, diagnostic and educational tool designed to validate and confirm the preparedness of an online user, business or organization of being cyberstalked and/or cyber harassed. The CSPC investigates personal and/or corporate vulnerability of being targeted, disparaged, harassed, monitored or infiltrated by cybercriminals, cyberstalkers, disgruntled ex-partners, past employees/customers or nefarious corporate competitors. Just as all the iPredator Internet Safety Tools, the CSPC focuses on the online user’s relationship to ICT, their knowledge base of cyberstalking and environmental aspects influencing their online activities related to being targeted by a cyberstalker. The CSPC is completed by an adult online user or business.

Internet Safety Checklist-Psychology

[ISCP]

Internet Safety Checklist Psychology [ISCP]: The Internet Safety Checklist Psychology is a 330- item checklist data collection and diagnostic tool for psychiatrists, psychologists, social workers and behavioral healthcare professionals. The goal of the ISCP is to verify a client’s online preparedness and vulnerability of being cyberbullied, cyberstalked, sexually solicited, internet trolled, stolen from and/or victimized by an online assailant. The ISCP can be used as an adjunct to individual and group therapy, prevention education training, an addition to biopsychosocial assessments and behavioral healthcare training. The ISCP is designed for online users ages 11+. Just as all the iPredator Internet Safety Tools, the ISCP focuses on the client’s relationship to ICT and internet safety knowledge base.

IPI Assessment Collection

Cyber Attack Risk Tests & Exams-Michael Nuccitelli, Psy.D.

iPredator Probability Inventory-Pediatric

[IPI-P]

iPredator Probability Inventory-Pediatric [IPI-P]: The iPredator Probability Inventory-Pediatric is a 110 question diagnostic, education, assessment and data collection tool designed to investigate an online user’s internet victimization risk potential, cyber attack awareness and support system involvement. A parent, primary caregiver or pediatric professional completes the IPI-P to assess children and adolescents ages 6-17. Just as all the IPI Assessment Collection Inventories, the IPI-P focuses on the child’s relationship to Information and Communications Technology, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and their practice of the behavioral actions necessary for internet safety and preparedness if cyber attacked. The IPI-P enables the respondent to inquire about the child’s internet safety practices.

iPredator Probability Inventory-Teen

[IPI-T]

iPredator Probability Inventory-Teen [IPI-T]: The iPredator Probability Inventory-Teen is a 110 statement diagnostic, education, assessment and data collection tool designed to investigate an adolescent or young adult’s online preparedness, vulnerability and risk potential of being targeted by an iPredator. This diagnostic tool is similar to the IPI-P & IPI-330, but queries areas developmentally relevant to an adolescent involving sexuality, intimate partnerships and perceived peer group acceptance. Just as all the IPI Assessment Collection Inventories, the IPI-T focuses on the adolescent’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology [ICT] activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked.

iPredator Probability Inventory-Cyber Bully

[IPI-CB]

iPredator Probability Inventory-Cyber Bully [IPI-CB]: The iPredator Probability Inventory-Cyber Bully is a 110-question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online preparedness, vulnerability and risk potential for being cyber bullied and/or harassed. A parent, primary caregiver and school official or pediatric professional complete the IPI-CBA for children, and adolescents ages 6-17. Just as all the IPI Assessment Collection inventories, the IPI-CB focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked. The IPI-CB enables the respondent to inquire about the child’s cyberbullying potential.

iPredator Probability Inventory-Cyber Bully Abuser

[IPI-CBA]

iPredator Probability Inventory-Cyber Bully Abuser [IPI-CBA]: The iPredator Probability Inventory-Cyber Bully Abuser is a 110 question diagnostic, education and data collection tool designed to investigate a child’s online probability and potential to intimidate, humiliate and taunt other children engaging in online harassment and cyberbullying. A parent, primary caregiver and school official or pediatric professional complete the IPI-CBA for children and adolescents ages 6-17. Just as all the IPI Assessment Collection Inventories, the IPI-CBA focuses on the child’s relationship to ICT, their knowledge base of cyberbullying, environmental aspects influencing their online activities and their practice of the behavioral actions necessary for non-adversarial and appropriate online activities. The IPI-CBA enables the respondent to inquire about the child’s potential to cyberbully.

iPredator Probability Inventory-Educator

[IPI-E]

iPredator Probability Inventory-Educator [IPI-E]: The iPredator Probability Inventory-Educator is a 330 question data collection, diagnostic and informational tool for educators regarding a student’s online risk potential and vulnerability of being targeted, cyberbullied, cyberstalked, sexually solicited and/or victimized by an online assailant. In addition to being a data collection tool and general screening exam, the IPI-E can also be used as an adjunct to classroom projects, prevention education plans and educator training seminars on internet safety. The IPI-E is designed for educators and educational institutions working with children, adolescents and young adults ages 9-21. Just as all the IPI Assessment Collection inventories, the IPI-E focuses on the student’s relationship to ICT and knowledge base of nefarious online users.

 

iPredator Probability Inventory-Adult

[IPI-A]

iPredator Probability Inventory-Adult [IPI-A]: The iPredator Probability Inventory-Adult is a 110 question diagnostic, education, assessment and data collection tool designed to investigate an adult’s preparedness, vulnerability, risk potential and cyber attack awareness. The IPI-A is also designed to assess an adult’s preparedness of being assaulted, taunted, criminalized and/or victimized by online assailants based on their online activities and level of cautious approach. The IPI-A is completed by an adult age 18+. Just as all the IPI Assessment Collection Inventories, the IPI-A focuses on the online user’s relationship to ICT, their knowledge base of nefarious online users and environmental aspects influencing their Information and Communications Technology (ICT) activities related to being targeted by an online assailant.

iPredator Probability Inventory-Cybercrime

[IPI-C]

iPredator Probability Inventory-Cybercrime [IPI-C]: The iPredator Probability Inventory- Cybercrime is a 110 statement diagnostic, education, assessment and data collection tool designed to assess and investigate an adult or business’s probability of being targeted, disparaged, stolen from or infiltrated by online assailants or nefarious corporate competitors engaged in cybercriminal and/or defamatory activities. An adult age 18+, business owner or corporate associate familiar with the business’s health and safety completes the IPI-C. Just as all the IPI Assessment Collection Inventories, the IPI-C focuses on the online user’s relationship to ICT, their knowledge base of nefarious online users and environmental aspects influencing their online activities related to being targeted by a cybercriminal or deceptive corporate competitors.

iPredator Probability Inventory-Cyber Stalking

[IPI-CS]

iPredator Probability Inventory-Cyber Stalking [IPI-CS]: The iPredator Probability Inventory- Cyber Stalking is a 110 question diagnostic, education, assessment and data collection tool designed to assess the probability and preparedness of a young adult, adult or public figure of being cyber stalked. In addition to cyber stalking, the IPI-CS investigates the subject’s potential of being cyber harassed by an ex-partner, ex-associate, fan, nefarious corporate entity or pathologically driven online user. Just as all the IPI Assessment Collection Inventories, the IPI-CS focuses on the online user’s relationship to Information and Communications Technology, their knowledge base of malevolent and nefarious online users and environmental aspects influencing their online activities related to being targeted by a cyberstalker or internet troll.

iPredator Probability Inventory-Business

[IPI-B]

iPredator Probability Inventory-Business [IPI-B]: The iPredator Probability Inventory-Business is a 110 questions diagnostic, education, assessment and data collection tool designed to assess a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by online assailants or nefarious corporate competitors. Related to cybercrime specific areas, the IPI-B also assesses a business’s cyber-security breach potential, digital reputation acumen and capacity to institute internet safety and cyber security strategies. A business owner, employee or consultant familiar with the business’s Information and Communications Technology [ICT] health and safety completes the IPI-B. The IPI-B is designed for using on a regular basis as part of a business’s internet safety and cyber security inquiries.

iPredator Probability Inventory-Psychologist

[IPI-PSY]

iPredator Probability Inventory-Psychologist [IPI-PSY]: The iPredator Probability Inventory- Psychologist is a 330 question data collection, educational and diagnostic tool for psychiatrists, psychologists, social workers and behavioral healthcare professionals regarding a child, adolescent or adult’s Information and Communications Technology [ICT] preparedness, probability and vulnerability of being cyber bullied, cyber stalked, sexually solicited, stolen from and/or targeted by iPredators. The IPI-PSY can also be used as an adjunct to individual and group therapy, prevention education training, an adjunct to intake assessments and behavioral healthcare training. The IPI-PSY is designed for children, adolescents and adults ages 9+. The IPI-PSY enables the respondent to inquire about the client’s internet safety practices and the importance of their online relationships.

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

iPredator Probability Inventory-330

[IPI-330]

iPredator Probability Inventory-330 [IPI-330]: The iPredator Probability Inventory-330 is a 330 question diagnostic, education, assessment and data collection tool designed to investigate a 6-21 year-old child, adolescent or young adult regarding their online victimization risk potential, cyber attack awareness and support system involvement. A parent, educator, family member or pediatric professional completes the IPI-330. Just as all the IPI Assessment Collection inventories, the IPI-330 focuses on a child and/or students relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and their practice of the behavioral actions necessary for Internet safety and preparedness if cyber attacked. The IPI-330 enables the respondent to inquire about the child’s internet safety practices.

iPredator Probability Inventory-Internet Predator

[IPI-IP]

iPredator Probability Inventory-IP [IPI-IP]: The iPredator Probability Inventory-Internet Predator is a 110 question data collection, diagnostic and educational tool designed to assess a child, adolescent or young adults preparedness, vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. A parent, primary caregiver, school official or pediatric professional completes the IPI-IP. In addition to being a diagnostic tool, the IPI-IP can also be used as an adjunct to a mental health and/or forensic assessment. The IPI-IP is designed for online users ages 6-21. Just as all the IPI Assessment Collection Inventories, the IPI-IP focuses on the child’s relationship to ICT, their knowledge base of online assailants and environmental aspects influencing their online activities.

Cyber Attack Risk Tests & Exams-Michael Nuccitelli, Psy.D.

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

iPredator Bridge

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.

Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissismor psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow. iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA]. In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

“By virtue of the proverbial “cloak of anonymity” so conveniently provided by Information and Communications Technology, iPredators troll cyberspace with a distinct advantage in that they may represent themselves in any way they choose.” Michael Nuccitelli, Psy.D. [2012]

an-internet-safety-tool-cyber-risk-test-internet safety products-internet-safety-educational-michael-nuccitelli-ipredator-authored-image

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

 

Pin It on Pinterest

Share This