Tag Archives: Dark Psychology

Business Internet Safety Checklist [BISC] | Dark Psychology


Cyber Attack Risk Assessments Internet Safety Tools Internet Safety Checklists iPredator Michael Nuccitelli Authored Image1 Business Internet Safety Checklist [BISC] | Dark Psychology
Business Internet Safety Checklist [BISC]

The Business Internet Safety Checklist [BISC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Business Internet Safety Checklist [BISC] assesses a business’s cyber security practices, cyber attack vulnerabilities and internet safety knowledge. Designed to be multi-functional, the Business Internet Safety Checklist [BISC] is a structured checklist for diagnostics, education, investigation and data collection. The BISC can also be used for compiling evidentiary information for authorities, corporate heads and the legal system if the business is suspected of being cyber attacked by an online assailant[s].

Internet safety and cyber security are issues vital to all American businesses operating in the Information Age. To help American businesses, Dr. Nuccitelli designed the Business Internet Safety Checklist [BISC]. Just as all the checklist risk assessments [IISC Collection], the BISC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Business Internet Safety Checklist BISC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image Business Internet Safety Checklist [BISC] | Dark Psychology

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Business Internet Safety Checklist-BISC [Full Version]  $149.95 [USD]
II. Business Internet Safety Checklist-BISC [Abridged Version]  $59.95 [USD]

Business Internet Safety Checklist BISC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Business Internet Safety Checklist [BISC] | Dark Psychology

Business Internet Safety Checklist Definition

Business Internet Safety Checklist [BISC]: The Business Internet Safety Checklist [BISC] is a 100-item checklist designed for a business to verify, upgrade or monitor their Information and Communications Technology [ICT] safety and security practices. The BISC is a data collection tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees, angry customers or nefarious corporate competitors.

Related to cybercrime specific areas, the BISC focuses the business on their cyber-security breach potential, digital reputation acumen and capacity to institute internet safety and cyber security strategies. With the rapid growth and expansion of Information and Communications Technology [ICT], all businesses are now required to allocate a portion of their operating budget to both cyber security and digital reputation management.

It is recommended to complete the BISC on a quarterly basis if corporate competitors or internal employee sabotage are suspected of engaging in online disparagement and internet defamation to the online reputation or brand[s] of the business. The BISC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and ICT vulnerabilities.

Internet Safety Checklist Internet Safety Test Internet Safety Tool Cyber Attack Risk Assessment iPredator Logo Michael Nuccitelli Authored Image Business Internet Safety Checklist [BISC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

Cyberbullying Target Checklist CBTC internet safety tools caduceus cyber attack risk assessments internet safety checklists ipredator michael nuccitelli authored image Business Internet Safety Checklist [BISC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Business Internet Safety Checklist [BISC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Business Internet Safety Checklist [BISC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”  Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

Cyber Attack Risk Assessments Internet Safety Tools Internet Safety Checklists iPredator Michael Nuccitelli Authored Image Business Internet Safety Checklist [BISC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Business Internet Safety Checklist [BISC] | Dark Psychology
iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

Internet Safety Checklists Internet Safety Tools Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Business Internet Safety Checklist [BISC] | Dark Psychology

iPredator Inc. Founder:
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Made in the USA Business Internet Safety Checklist BISC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Business Internet Safety Checklist [BISC] | Dark Psychology

 

HOME BUTTON Business Internet Safety Checklist [BISC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Cyberbullying Target Checklist [CBTC] | Dark Psychology

Cyberbullying Target Checklist CBTC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image Cyberbullying Target Checklist [CBTC] | Dark Psychology
Cyberbullying Target Checklist [CBTC]

The Cyberbullying Target Checklist [CBTC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Cyberbullying Target Checklist [CBTC] assesses a child’s high-risk online activities, cyber attack vulnerabilities and cyberbullying target potential. Designed to be multi-functional, the Cyberbullying Target Checklist [CBTC]  is a structured checklist for diagnostics, education, investigation and data collection. The CBTC can also be used for compiling evidentiary information for authorities, school officials and the legal system if the child is suspected of being cyberbullied.

Cyberbullying, cyber harassment and cyberstalking is the trinity of Information Age abuse being perpetrated by children who target other children. Dr. Nuccitelli has designed the Cyberbully Target Checklist [CBTC]. In addition to developing the CBTC, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization.

CBTC Cyberbullying Target Checklist CBTC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Cyberbullying Target Checklist [CBTC] | Dark Psychology

Just as all the checklist risk assessments [IISC Collection], the CBTC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Cyberbully Target Checklist-CBTC [Full Version] $149.95 [USD]
II.
Cyberbully Target Checklist-CBTC [Abridged Version] $59.95 [USD]

Cyberbullying Target Checklist CBTC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Cyberbullying Target Checklist [CBTC] | Dark Psychology

Cyberbully Target Checklist [CBTC] Definition

Cyberbully Target Checklist [CBTC]: The Cyberbully Target Checklist is a 75-item education, assessment and data collection tool designed for parents, teachers, educators and pediatric professionals on a pre-pubescent, adolescent or young adult’s vulnerability and risk potential of being targeted by a cyberbully. The CBTC queries and explores areas developmentally relevant to school aged children.

The goal of the CBTC is to investigate & educate children on their vulnerability and risk potential of being targeted by a cyberbully engaged in teasing, taunting, harassment and disparagement of a target child using Information and Communications Technology [ICT]. In addition to an education, assessment and data collection tool, the CBTC has been designed to allow teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology [ICT] practices.

The CBTC combines common factors causing children and young adults to be teased, harassed and targeted by others motivated by their need for peer acceptance and feelings of domination, power and control. The CBTC can also be used to educate children and classes of students on cyberbullying prevention and intervention. Furthermore, the CBTC is helpful educating children on bullying/cyberbullying bystander dynamics and cyberbully recognition skills building. The CBTC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Cyberbullying Target Checklist CBTC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Image Cyberbullying Target Checklist [CBTC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

Cyberbullying Target Checklist CBTC internet safety tools caduceus cyber attack risk assessments internet safety checklists ipredator michael nuccitelli authored image Cyberbullying Target Checklist [CBTC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”  Michael Nuccitelli, Psy.D. [2012]

Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Cyberbullying Target Checklist [CBTC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Cyberbullying Target Checklist [CBTC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

Internet Safety Tools Internet Safety Checklist Psychology ISCP Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Cyberbullying Target Checklist [CBTC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Cyberbullying Target Checklist [CBTC] | Dark Psychology
iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Cyberbullying Target Checklist [CBTC] | Dark Psychology
iPredator Inc. Founder:
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Made in the USA Cyberbullying Target Checklist CBTC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Cyberbullying Target Checklist [CBTC] | Dark Psychology


HOME BUTTON Cyberbullying Target Checklist [CBTC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Parent Cyber Safety Checklist [PCSC] | Dark Psychology


Parent Cyber Safety Checklist PCSC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology
Parent Cyber Safety Checklist [PCSC]

The Parent Cyber Safety Checklist [PCSC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Parent Cyber Safety Checklist [PCSC] assesses a child’s high-risk online activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the Parent Cyber Safety Checklist [PCSC] is a structured checklist for diagnostics, education, investigation and data collection. The PCSC can also be used for compiling evidentiary information for authorities, school officials and the legal system if the child is suspected of being cyber attacked by an online assailant.

An exhaustive cyber safety risk assessment for parents has been released by iPredator Inc. Developed by Dr. Nuccitelli, this cyber risk assessment assists parents, primary caregivers and helps assess the child’s cyber attack vulnerabilities and internet safety prowess. Cyber safety for parents is one of the new and rapidly growing issues parents must efficiently coordinate raising children of the Information Age. Cyberbullying, online sexual predation and cyber harassment are just a few examples of the dark side children have to manage. Not just parents, but also all of society is presented with a new form of communication that is not governed or monitored for nefarious and malevolent online activities.

Parent Cyber Safety Checklist PCSC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

As founder of iPredator Inc., Dr. Nuccitelli has designed the Parent Cyber Safety Checklist [PCSC]. In addition to developing the PCSC, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. Just as all the checklist risk assessments [IISC Collection], the ISCP can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Parent Cyber Safety Checklist-PCSC [Full Version] $259.95 [USD]
II.
Parent Cyber Safety Checklist-PCSC [Abridged Version] $89.95 [USD]

Parent Cyber Safety Checklist PCSC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology
Parent Cyber Safety Checklist [PCSC] Definition

Parent Cyber Safety Checklist [PCSC]: The Parent Cyber Safety Checklist is a 330-item education, assessment and data collection checklist designed for parents and primary caregivers on pre-pubescent and adolescent internet safety and responsible Information and Communications Technology [ICT] usage. The PCSC is constructed for parents and primary caregivers to verify and confirm their child’s Internet safety and cyber security practices are valid in preventing a cyber-attack by an iPredator.

The PCSC also helps to educate children on their vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment, cyberbullying or trolling for a target to sexually victimize. In addition to an educational tool, the PCSC has been designed to allow parents, teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children on their Information and Communications Technology [ICT] practices.

The PCSC combines common factors causing children to be cyberbullied, harassed and targeted by online sexual predators. The factors most problematic for children include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. Based on a parent’s internet safety familial endeavors, the PCSC can also be used along with their child and the entire family during family discussions on cyber security. The PCSC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Dr. Nuccitelli has stated, “Everything I’ve designed and authored has been fueled by one mission and one mission alone. Knowing I live in the Information Age and there’s members of society, of all ages, who use ICT to harm and defile children freely without fear of punishment, is an accelerant that will motivate me for the next four decades.”

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

Parent Cyber Safety Checklist PCSC internet safety tools caduceus cyber attack risk assessments internet safety checklists ipredator michael nuccitelli authored image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”  Michael Nuccitelli, Psy.D. [2012]

Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Parent Cyber Safety Checklist PCSC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

Internet Safety Tools Internet Safety Checklist Psychology ISCP Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

iPredator Inc. Resources 

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Parent Cyber Safety Checklist [PCSC] | Dark Psychology

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Parent Cyber Safety Checklist [PCSC] | Dark Psychology
iPredator Inc. Founder:
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Made in the USA Parent Cyber Safety Checklist PCSC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Parent Cyber Safety Checklist [PCSC] | Dark Psychology

 

HOME BUTTON Parent Cyber Safety Checklist [PCSC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Post Navigation