Troll Man vs. Cyber Tyger
Michael Nuccitelli, Psy.D.
Child Internet Safety Characters
by Michael Nuccitelli, Psy.D.
Cyber Tyger1 and Troll Man2 are two concepts, mascots and characters designed to teach young children, (K-6), internet safety and cyber attack prevention practices. Cyber Tyger and Troll Man are characters developed by this writer, Michael Nuccitelli, Psy.D.3, serving as the classic archetypes of Hero vs. Villain. Cyber Tyger is a “Pediatric Internet Safety Superhero” and Troll Man is a “Pediatric Internet Troll Super Villain”. While Cyber Tyger travels throughout cyberspace and Information and Communications Technology (ICT) channels helping children, Troll Man uses the same digital and electronic avenues to, directly and indirectly, harm and lie to children and their parents. Cyber Tyger and Troll Man are archetypes that fall under this writer’s concept of Information Age Education. A brief definition of Information Age Education is as follows:
Information Age Education (IAE) 4: Information Age Education (IAE) is a cyber attack prevention paradigm offering a solution to reducing the negative consequences of living in the Information Age. The Information Age and ICT present positive and negative influences upon humanity in which the negative aspects grow at a feverish pace. IAE prioritizes prevention education, family values and humility as solutions to what this writer has stated, “Connecting the disconnected, educating the ignorant, and conquering the corrupt“. IAE staunchly recommends the practice of cyber attack prevention education, internet safety, non-denominational family values and humility.
Integral, if not the foremost component in the goal of slowing the trajectory of the societal disconnection process, is the active participation of educational systems, religious organizations, service organizations and positive pro-social public figures. Although it is impossible for any person, group or nation to be absolutely insulated from being cyber attacked or targeted for nefarious and malevolent reasons, the odds and probability thereof can certainly be reduced through IAE.
Cyber Tyger, Troll Man & Cyber Justice League
For children interested in fighting Troll Man5 and other online child assailants, they can join Cyber Tyger6 by becoming a member of the Cyber Justice League. As a member of the Cyber Justice League, children learn to protect themselves, help Cyber Tyger defeat Troll Man, and most importantly, help other children who are being targeted by cyberbullies7 and internet trolls8. In addition to online safety and protection, Cyber Tyger and Troll Man teach young children about the importance of Digital Citizenship9, Netiquette10 and Internet Addiction Prevention11. An idea for consideration is offering a means for children to contact their school via a Cyber Justice League web page their school offers at their website. If the school does not have a website, a free social networking site page can be set up allowing children a confidential way to contact them. Cyber Tyger12, Troll Man13, iPredator and this writer’s related concepts and definitions are presented for consideration. Cyber Tyger and Troll Man are public domain characters designed for educational purposes exactly as Smokey the Bear14 & McGruff the Crime Dog15.
Although this writer created the archetypes of Cyber Tyger & Troll Man to teach young children about the dangers lurking in cyberspace, his goal is not for financial gain using these characters. This writer’s mission is not the commercialization of Cyber Tyger and Troll Man, but to alert humankind of the need to address online harm, victimization, deception and disconnectedness growing at a rapid pace throughout all Information Age16 societies. Just as Smokey the Bear and McGruff the Crime Dog, Cyber Tyger and Troll Man are public domain, free to all online users and require no permission or consent to reproduce or share. Not allowed is attempting to claim exclusive copyright to Cyber Tyger and Troll Man or engaging in plagiarism17.
The goal of Cyber Tyger18, Troll Man19 and this paper is to encourage Information Age adults to develop and implement strategies that teaches children to prioritize internet safety, learning how to recognize iPredators and why it important to behave appropriately online and when using ICT. The concepts of Cyber Tyger and Troll Man were developed by this writer, Michael Nuccitelli, Psy.D., a NYS licensed psychologist, certified forensic consultant and founder of the New York Internet Safety Company, iPredator Inc. As the author of this article, this writer believes it is vital to teach children adaptive online and ICT behaviors before they reach adolescence. It is well documented by research that early childhood education and experiences have lifelong impact upon their intrapersonal and interpersonal dynamics.
“Contemporary society is living at the beginning of the Information Age when there are few internet laws, guidelines or proverbial “moral commandments” to be followed, expected or encouraged by humankind. Until that day comes, prevention education of society’s children is the first step to reducing the future large scales cyber terrorist attacks upon communities and nations.” Michael Nuccitelli, Psy.D. (2014)
It has been posited by this writer that educating young children about appropriate online behaviors and adaptive ICT usage will reduce their risk of becoming an iPredator20 throughout adolescence and adulthood. Online sexual predation, cyberstalking, cyberbullying, internet trolling and cybercrime are examples of iPredator typologies that can be introduced to young children and still be developmentally appropriate for their age range by using the Cyber Tyger and Troll Man. This writer’s definition of iPredator is as follows:
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully21, cyberstalker22, cyber harasser23, internet troll24, cybercriminal25, online sexual predator26, cyber terrorist27, online child pornographer28 or engaged in internet defamation29 or nefarious cyber deception30, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT) 31. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace32. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth33, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
Who is Cyber Tyger?
Cyber Tyger: Cyber Tyger34 (aka, Cybr Tygrrrrrr!) is a young white tiger superhero who protects young kids online (K-6). Cyber Tyger helps protect kids from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety35 and cyber attack prevention.
At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication. iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers. Whereas Cyber Tyger’s hero, McGruff the crime dog says, “Take a Bite out of Crime“, Cyber Tyger’s motto is “Take a Megabyte out of Cybercrime“. Until iPredator Inc. creates his own website, information about Cyber Tyger can be accessed at his iPredator page by clicking here: Cyber Tyger or his own domain that redirects to this page as well.www.CyberTyger.org
Who is Troll Man?
Troll Man: Troll Man35 is a pediatric internet troll villain, internet safety character, online scoundrel and enemy of the internet safety superhero, Cyber Tyger, for children (K-6). Cyber Tyger and his adversaries, including Troll Man’s profile, were originally conceived in 2011 as a means to educate young children about internet safety36 and cyber attack prevention. As a Cyborg with digital powers, Troll Man travels through cyberspace cheating, lying and stealing from online users. Once a child opens his iTroll email attachments, they cannot escape unless helped by Cyber Tyger. Troll Man is most dangerous when using his shape shifting powers for online deception. At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication.
In cyberspace, Troll Man can turn himself into almost perfect replicas of his target’s online friends, loved ones and teachers. He can also shape shift into different digital devices and software programs. Although he is stuck in cyberspace and can never leave, Troll Man wants to rule the earth. To make sure he stays locked online, Cyber Tyger & his cyber safety savvy legion of kids work hard to prevent his escape. By protecting and teaching other online users about cyberbullying, cybercrime, cyberstalking, internet trolling, cyber harassment, internet addiction and online deception, the Cyber Justice League keeps Troll Man trapped online.
iPredator Inc. plans on offering Troll Man and his related characters, at no cost, to elementary schools, parents and primary caregivers. Until iPredator Inc. creates his own website, information about Troll Man can be accessed at his iPredator page by clicking here: Troll Man or his own domain that redirects to his page as well. www.TrollMan.org.
Internet Troll: An Internet Troll37 is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions.
When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.
The motivations for an Internet Troll’s38 provocative, and often times, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors.
Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners (Identification # 103110.) In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering the private & public sectors educational and advisory services regarding internet predators, cybercrime, online deception & cybercriminal psychology. In June 2013, Dr. Nuccitelli, his colleagues and iPredator Inc. formally launched their websites, iPredator, Dark Psychology and Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services.
Over the last 30 years, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist and worked in the field of Forensic Psychology39, conducting evaluations and consultation, for organizations, attorneys and court systems. Dr. Nuccitelli has extensive career and academic experiences in the areas of criminal psychology, cybercriminal psychology, psychopathology, addictions and developmental psychology.
Dr. Nuccitelli is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. In addition to work on his iPredator construct, Dr. Nuccitelli continues to investigate and expand his constructs, iPredator Bridge40, Online Psychopathy41, Cyberstealth, 5PV Model42, Darkside of Cyberspace43, Dark Psychology44 and Human Consciousness concepts. Dr. Nuccitelli is always receptive to being contacted by those seeking association, help, advice or knowledge in the realms of the Information Age & Cybercriminal Mind.
At the center of iPredator Inc.’s products, services and investigation strategies is Dr. Nuccitelli’s theoretical construct, iPredator. As a past member and consultant to the American College of Forensic Examiners Institute, iPredator was the feature article in their 2011 winter issue of the “Forensic Examiner” published quarterly. Since 2009, Dr. Nuccitelli has dedicated himself to learning the psychopathological, criminological and psychodynamic composition of those engaged in online malevolent activities.
“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D. (2013)
Cyberbullying: Cyberbullying45 is defined as threatening or disparaging information directed at a target child delivered through Information and Communications Technology (ICT). Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyberbullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy is when a cyberbully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyberbullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.
Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated and/or bullies themselves.
Cyber Harassment Definition
Cyber Harassment: Cyber Harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target. Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations.
Cyber harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the internet becomes more feasible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor. Although cyberbullying is associated with minors, workplace bullying has been applied to adults who are targeted by co-workers.
Cyberstalking: Cyberstalking46 is the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant [aka, iPredator] and typology of psychopathological ICT user. Cyberstalking tactics include false accusations, threats of physical harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of cyberstalking, the information and tactics used must involve a direct, indirect or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.
Examples of psychological threats include habitual disparagement, humiliation and disinformation dissemination to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. Cyberspace is an abstract global medium, regardless of frontiers, creating new possibilities for this growing class of online assailant. The internet is inexpensive and easy to access and geographic distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target online users and a psychopathology.
iPredator Inc. is a New York State based Information Age Forensics company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, internet trolls, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field the founder is pioneering he has termed, Cybercriminal Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, their mission is to initiate a national sustained educational & awareness campaign with the help of private, state and federal agencies.
Dr. Nuccitelli and iPredator Inc. colleagues and associates regular update their criminal psychology, cybercrime & forensics blog, called Dark Psychology and their Internet Safety & blog called Dr. Internet Safety. Their website, iPredator.co (a.k.a. www.iPredatorInc.com), offers site visitors an enormous database on cybercriminal psychology, internet safety and online predators.
For online users interested in learning more about Dark Psychology & iPredator outside this website or our forensic & internet safety blogs, please visit our iPredator & Dark Psychology Google + Community pages. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-9871-2416 or via email at firstname.lastname@example.org.
- Google Plus: iPredator
- Google Plus: Michael Nuccitelli, Psy.D.
- Linked In:
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
- Pinterest: iPredator Inc.
“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli, Psy.D. (2012)
Note: Cyber Tyger and Troll Man are internet safety characters that have changed names, histories, appearances and back-stories multiple times since 2011. Initially, Cyber Tyger was a white panther and Troll Man resembled the Joker character from Batman. Until this writer and his associates all agree upon their final presentation best suited for young children, there is a good chance changes will occur. iPredator Inc.’s goal is to have final vector images by spring 2015 with public availability for all online users at no cost. If the reader is adept at graphic design or knows a professional who would be an excellent participant, iPredator Inc. would be thankful to contact us with ideas.
iPredator Inc.’s internet safety themed content and images are public domain and free to download at no cost or requiring contact information. However, iPredator Inc. does not allow plagiarism or claims that parties other than iPredator Inc. are the authors. All concepts, constructs and commercial products offered at iPredator Inc.’s websites, sister blogs and social networking sites are protected by copyright and the intellectual property of Dr. Nuccitelli and iPredator Inc.
Cyber Tyger Short Definition
Cyber Tyger (aka, Cybr Tygrrr!) is a young white Bengal Tiger superhero who protects kids online. Cyber Tyger works to stop cyberbullies, cybercrime, online child predators and the dangers in cyberspace aimed at hurting kids. When he was born, the doctors used digital technology to help his mother give birth. Without the doctor’s knowledge, the cyber circuitry they used gave Cyber Tyger superhero powers. Cyber Tyger is an internet safety character for children K-6. iPredator Link: www.CyberTyger.org
Troll Man Short Definition
Troll Man is an internet troll villain, enemy of Cyber Tyger and online scoundrel to kids. As a Cyborg with many digital powers, Troll Man travels through cyberspace cheating, lying and stealing from anyone who he targets. Once a child opens his iTroll email attachments, they cannot escape his powers. Troll Man is most dangerous when using his shape shifting powers to lie to kids and their parents. Troll Man & Cyber Tyger are internet safety characters for children K-6. iPredator Link: www.TrollMan.org
- Cyber Tyger, iPredator: https://www.ipredator.co/cyber-tyger/
- Troll Man, iPredator: https://www.ipredator.co/troll-man/
- Michael Nuccitelli, Psy.D. iPredator Inc.: https://www.ipredator.co/michael-nuccitelli/
- Information Age Education, iPredator: https://www.ipredator.co/information-age-education/
- Troll Man, Education News: http://www.educationviews.org/troll-man/
- Cyber Tyger, Education News: http://www.educationviews.org/cyber-tyger-troll-man/
- Cyberbullies, Dr. Internet Safety: https://drinternetsafety.com/michael-nuccitelli-cyber-bullying/
- Internet Trolls, Dark Psychology: https://darkpsychology.co/internet-trolls/
- Digital Citizenship, Kansas State University: http://www.digitalcitizenship.net/
- Netiquette, John Hopkins University: http://www.albion.com/netiquette/corerules.html
- Internet Addiction, iPredator: https://www.ipredator.co/internet-addiction/
- Cyber Tyger, Dark Psychology: https://darkpsychology.co/cyber-tyger-troll-man/
- Troll Man, Dark Psychology: https://darkpsychology.co/troll-man/
- Smokey the Bear, Wikipedia: http://en.wikipedia.org/wiki/Smokey_Bear
- McGruff the Crime Dog, Wikipedia: http://en.wikipedia.org/wiki/McGruff_the_Crime_Dog
- Information Age, Princeton University: http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Information_Age.html
- Plagiarism, Purdue University: https://owl.english.purdue.edu/owl/resource/589/01/
- Cyber Tyger, Dr. Internet Safety: https://drinternetsafety.com/cyber-tyger-troll-man/
- Troll Man, Dr. Internet Safety: https://drinternetsafety.com/troll-man/
- iPredator, iPredator Website: https://www.ipredator.co/ipredator/
- Cyberbully, iPredator Website: https://www.ipredator.co/michael-nuccitelli-cyberbullying/
- Cyberstalker, iPredator Website: https://www.ipredator.co/cyberstalking/
- Cyber Harasser, iPredator Website: https://www.ipredator.co/cyber-harassment/
- Internet Troll, iPredator Website: https://www.ipredator.co/internet-trolls/
- Cybercriminal, iPredator Website: https://www.ipredator.co/cybercrime/
- Online Sexual Predator, iPredator Website: https://www.ipredator.co/online-predator-prevention/
- Cyber Terrorist, iPredator Website: https://www.ipredator.co/cyber-terrorism/
- Online Child Pornography, FBI: http://www.fbi.gov/about-us/investigate/vc_majorthefts/cac/overview-and-history
- Internet Defamation, Dark Psychology: https://darkpsychology.co/lnm-radio-network-internet-radio-troll/
- Cyber Deception, iPredator Website: https://www.ipredator.co/online-deception/
- Information and Communications Technology (ICT), TechTarget: http://searchcio.techtarget.com/definition/ICT-information-and-communications-technology-or-technologies
- Cyberspace, Rider University: http://users.rider.edu/~suler/psycyber/basicfeat.html
- Cyberstealth, iPredator Website: https://www.ipredator.co/cyberstealth/
- Cyber Tyger, Pinterest Board: http://www.pinterest.com/ipredator/cyber-tyger/
- Internet Safety Dynamics, iPredator Website: https://www.ipredator.co/internet-safety-dynamics/
- Troll Man, Pinterest Board: http://www.pinterest.com/ipredator/troll-man/
- Internet Safety for Parents, iPredator Website: https://www.ipredator.co/parents/
- Internet Troll, Dark Psychology: https://darkpsychology.co/internet-trolls/
- Internet Troll, Dr. Internet Safety: https://drinternetsafety.com/internet-troll/
- Forensic Psychology, John Jay College: http://www.jjay.cuny.edu/departments/psychology/about.php
- iPredator Bridge, iPredator Website: https://www.ipredator.co/ipredator-bridge/
- Online Psychopathy, iPredator Website: https://www.ipredator.co/online-psychopaths/
- 5PV Model, iPredator Website: https://www.ipredator.co/cybercriminal-5pv-model/
- Darkside of Cyberspace, iPredator Website: https://www.ipredator.co/darkside-of-cyberspace/
- Dark Psychology, iPredator Website: https://www.ipredator.co/dark-psychology/
- Cyberbullying, iPredator Website: https://www.ipredator.co/cyberbullying-facts/
- Cyberstalking, iPredator Website: https://www.ipredator.co/cyberstalking-facts/
Blog Post Hash Tags
#TrollMan #CyberTyger #InternetSafetyforKids #InternetTroll #MichaelNuccitelli #Cyberbullying #iPredator #Education #Parenting #Children #CyberbullyingPrevention #NationalBullyingPreventionMonth #Psychology #Media #Radio #GuestExpert #EducationNews #DarkPsychology #DrInternetSafety #School
“Children are no more ignorant to the reality-virtuality continuum than adults evidenced by exploding cybercrime consumer costs, online dating site drama and Facebook obsessions reported by none other than adults.” Michael Nuccitelli, Psy.D. (2014)
- iPredator Inc.
- Michael Nuccitelli, Psy.D.
- NYS Licensed Psychologist
- New York, U.S.A.
- Ph: 347-871-2416
- Website: https://www.ipredator.co/
- Email: email@example.com
- Copyright © 2014. iPredator Inc., All Rights Reserved.
- Troll Man: U.S. Copyright #1-1796196711
- Cyber Tyger: U.S. Copyright #1-1825203061