Troll Man: Internet Safety for Kids & Who is Troll Man?

a-troll-man-cyber-tyger-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

TROLL MAN

Who is Troll Man?

Troll Man is Pediatric Internet Super Villain, Internet Safety Character and is the archenemy to the internet safety superhero; Cyber Tyger. Cyber Tyger and Troll Man were created by Michael Nuccitelli, Psy.D, a NYS licensed psychologist, forensic psychology consultant and author of the darkside of cyberspace construct called iPredator. Provided below is a brief definition and overview of Troll Man and Cyber Tyger. As superhero and villain characters, Cyber Tyger and Troll Man were designed to introduce Internet Safety, Information Age Educational concepts and Netiquette to young children K-6.

Troll Man is a pediatric internet troll villain, internet safety character, online scoundrel and enemy of the internet safety superhero, Cyber Tyger, for children (K-6). Cyber Tyger and his adversaries, including Troll Man’s profile, were originally conceived in 2011 as a means to educate young children about internet safety and cyber attack prevention. As a Cyborg with digital powers, Troll Man travels through cyberspace cheating, lying and stealing from online users.

Once a child opens his iTroll email attachments, they cannot escape unless helped by Cyber Tyger. Troll Man is most dangerous when using his shape shifting powers for online deception. At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication.

iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers. Until iPredator Inc. creates his own website, information about Troll Man can be accessed at his iPredator page, https://www.ipredator.co/troll-man/, or his own domain that redirects to his page as well. http://www.TrollMan.org. Feel free to read or download, at no cost, a brief history of Troll Man below and visit his board to download images at iPredator Inc.’s Pinterest account. http://www.pinterest.com/ipredator/troll-man/

a-troll-man-cyber-tyger-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

Internet Troll

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions.

When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and often times, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors.

Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.

Cyber Tyger

a-troll-man-cyber-tyger-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

“Take a Megabyte out of Cybercrime”

Cyber Tyger (aka, Cybr Tygrrr!) is a young white tiger superhero who protects young kids online (K-6). Cyber Tyger helps protect kids from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety and cyber attack prevention.

At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication. iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers.

Whereas Cyber Tyger’s hero, McGruff the crime dog says, “Take a Bite out of Crime“, Cyber Tyger’s motto is “Take a Megabyte out of Cybercrime.” Until iPredator Inc. creates his own website, information about Cyber Tyger can be accessed at his iPredator page, https://www.ipredator.co/cyber-tyger/, or his own domain that redirects to his page as well. (www.CyberTyger.org) Feel free to read or download, at no cost, a brief history of Cyber Tyger and visit his board to download images at iPredator Inc.’s Pinterest account. http://www.pinterest.com/ipredator/cyber-tyger/

a-troll-man-cyber-tyger-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

  • Copyright © 2014. iPredator Inc., All Rights Reserved.
  • Troll Man:  U.S. Copyright  #1-1796196711
  • Cyber Tyger:  U.S. Copyright  #1-1825203061

Note: Cyber Tyger and Troll Man are internet safety characters that have changes names, histories, appearances and back-stories multiple times since 2011. Initially, Cyber Tyger was a white panther and Troll Man resembled the Joker character from Batman. Until this writer and his associates all agree upon their final presentation best suited for young children, there is a good chance minor changes will be discussed. iPredator Inc.’s goal is to have final vector images by Spring 2015 with public availability for all online users at no cost. If the reader is adept at graphic design or knows a professional who would be an excellent participant, iPredator Inc. would be thankful to contact us with ideas.

iPredator Inc.’s internet safety themed content and images are public domain and free to download at no cost or requiring contact information. However, iPredator Inc. does not allow plagiarism or claims that parties other than iPredator Inc. are the authors. All concepts, constructs and commercial products offered at iPredator Inc.’s websites, sister blogs and social networking sites are protected by copyright and the intellectual property of Dr. Nuccitelli and iPredator Inc.

a-troll-man-cyber-tyger-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

  • Cyber Tyger | Pediatric Internet Safety Super Hero
  • Visit iPredator’s Cyber Tyger webpage to review or download, at no cost, information about the pediatric internet safety super hero called Cyber Tyger.
  • Link: https://www.ipredator.co/cyber-tyger/
  • Troll Man | Pediatric Internet Troll Super Villain 
  • Visit iPredator’s Troll Man webpage to review or download, at no cost, information about the pediatric internet troll super villain called Troll Man.
  • Link: https://www.ipredator.co/troll-man/

Internet Safety for Kids-Troll Man-Cyber Tyger-Michael Nuccitelli-iPredator-Text Image

a-troll-man-cyber-tyger-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyber Tyger: Internet Safety Hero for Kids & Who is Cyber Tyger?

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

Cyber Tyger: Internet Safety Hero for Kids

&

Who is Cyber Tyger?

Cyber Tyger is Pediatric Internet Safety Superhero, Internet Safety Character and is the archenemy to the Internet Troll super villain; Troll Man. Cyber Tyger and Troll Man were created by Michael Nuccitelli, Psy.D, a NYS licensed psychologist, forensic psychology consultant and author of the darkside of cyberspace construct called iPredator. Provided below is a brief definition and overview of Cyber Tyger and Troll Man. As superhero and villain characters, Cyber Tyger and Troll Man were designed to introduce Internet Safety, Information Age Educational concepts and Netiquette to young children K-6.

“Take a Megabyte out of Cybercrime”

Cyber Tyger (aka, Cybr Tygrrr!) is a young white tiger superhero who protects young kids online (K-6). Cyber Tyger helps protect kids from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety and cyber attack prevention. At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication. iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers.

Whereas Cyber Tyger’s hero, McGruff the crime dog says, “Take a Bite out of Crime“, Cyber Tyger’s motto is “Take a Megabyte out of Cybercrime.” Until iPredator Inc. creates his own website, information about Cyber Tyger can be accessed at his iPredator website page, https://www.ipredator.co/cyber-tyger/, or his own domain that redirects to his page as well. (www.CyberTyger.org). Feel free to read or download, at no cost, a brief history of Cyber Tyger and visit his board to download images at iPredator Inc.’s Pinterest account. http://www.pinterest.com/ipredator/cyber-tyger/

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

Troll Man

Troll Man is a pediatric internet troll villain, internet safety character, online scoundrel and enemy of the internet safety superhero, Cyber Tyger, for children (K-6). Cyber Tyger and his adversaries, including Troll Man’s profile, were originally conceived in 2011 as a means to educate young children about internet safety and cyber attack prevention. As a Cyborg with digital powers, Troll Man travels through cyberspace cheating, lying and stealing from online users. Once a child opens his iTroll email attachments, they cannot escape unless helped by Cyber Tyger. Troll Man is most dangerous when using his shape shifting powers for online deception. At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication.

iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers. Until iPredator Inc. creates his own website, information about Troll Man can be accessed at his iPredator page, https://www.ipredator.co/troll-man/, or his own domain that redirects to his page as well. http://www.TrollMan.org. Feel free to read or download, at no cost, a brief history of Troll Man below and visit his board to download images at iPredator Inc.’s Pinterest account. http://www.pinterest.com/ipredator/troll-man/

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

Note: Cyber Tyger and Troll Man are internet safety characters that have changes names, histories, appearances and back-stories multiple times since 2011. Initially, Cyber Tyger was a white panther and Troll Man resembled the Joker character from Batman. Until this writer and his associates all agree upon their final presentation best suited for young children, there is a good chance minor changes will be discussed. iPredator Inc.’s goal is to have final vector images by Spring 2015 with public availability for all online users at no cost. If the reader is adept at graphic design or knows a professional who would be an excellent participant, iPredator Inc. would be thankful to contact us with ideas.

iPredator Inc.’s internet safety themed content and images are public domain and free to download at no cost or requiring contact information. However, iPredator Inc. does not allow plagiarism or claims that parties other than iPredator Inc. are the authors. All concepts, constructs and commercial products offered at iPredator Inc.’s websites, sister blogs and social networking sites are protected by copyright and the intellectual property of Dr. Nuccitelli and iPredator Inc.

  • Cyber Tyger | Pediatric Internet Safety Super Hero
  • Visit iPredator’s Cyber Tyger webpage to review or download, at no cost, information about the pediatric internet safety super hero called Cyber Tyger.
  • Link: https://www.ipredator.co/cyber-tyger/
  • Troll Man | Pediatric Internet Troll Super Villain 
  • Visit iPredator’s Troll Man webpage to review or download, at no cost, information about the pediatric internet troll super villain called Troll Man.
  • https://www.ipredator.co/troll-man/

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

  • Copyright © 2014. iPredator Inc., All Rights Reserved.
  • Troll Man:  U.S. Copyright  #1-1796196711
  • Cyber Tyger:  U.S. Copyright  #1-1825203061

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

 

Bipolar Disorder & Mood Disorder Notes by Dr. Nuccitelli

Bipolar Disorder & Mood Disorder Notes

a-bipolar-disorder-mood-disorder-dr-internet-safety-dark-psychology-ipredator-michael- nuccitelli-image

Bipolar Disorder Notes

by Michael Nuccitelli, Psy.D.

iPredator Inc.

April, 2014

“Bipolar Disorder | Offline & Online Environmental Considerations” is an educational article for families, loved ones and healthcare providers seeking information about those suffering from Bipolar Disorder and related psychiatric disabilities. Authored by Michael Nuccitelli, Psy.D., a NYS licensed psychologist, forensic consultant and author of the Information Age forensic construct iPredator, the article provides helpful information addressing Bipolar Disorder in both offline & online environments. 

Disability: Disability is defined as a physiological and/or psychological impairment that negatively limits one or more major life activities in a person’s life, there is an established record of these limitations and a general consensus that the person exhibits impairment.

For those who suffer from Bipolar Disorder or any form of psychopathology, the challenges presented in adaptive functioning and employment environments can be complex, daunting and anxiety provoking. Related to employment, a recent survey compiled by the Depression and Support Alliance estimate that 9 out of 10 Bipolar Disordered adults reported their illness directly impacted work performance and employment relationships. Not to say that medication, exercise, proper diet, therapy, spirituality and a healthy lifestyle cannot reduce these negative consequences, but the cyclical & unpredictable nature of Bipolar Disorder can become a full time job in of itself.

Mirroring the signs and symptoms of Bipolar Disorder, many sufferers often seek out employment opportunities that tend to be intense, project based and short in duration. Even when employed in what would be considered a structured and predictable job, the Bipolar Disordered person tends to manage their task requirements with intensity and hyper focus. Although a structured work environment, with predictable task assignments, have been shown to be most conducive, the idea of a daily routine can easily lead the Bipolar Disordered person to feelings of boredom and disenfranchisement.

For the Bipolar Disordered person, a structured work environment that provides organization, stability and predictability is by far the best employment plan. The byproduct of a structured schedule and predictable work environment reduces the probability of the prime trigger for all Bipolar Disordered persons, which is over stimulation. For the Bipolar Disordered person, environmental employment factors that are stimulation focused are problematic.

As stated, a healthy lifestyle combining organization, stability and predictability is paramount for reducing the negative consequences of Bipolar Disorder. Although Bipolar Disorder has its own unique quality and conditions, compared to other types of psychological dysfunction, a healthy lifestyle that prioritizes organization, stability and predictability is preferred.

A large part of a healthy lifestyle is recognizing the vital importance of medication management and healthcare provider support. It cannot be stressed enough that a consistent dedication to medication management is crucial to behavioral stability. Just as someone who suffers from Type I Diabetes that requires regular insulin shots throughout the day to maintain proper functioning, so too does the Bipolar Disordered person has to prioritize their medication regimen.

a-bipolar-disorder-mood-disorder-dr-internet-safety-dark-psychology-ipredator-michael-nuccitelli-image

What are Mood Disorders

Bipolar Disorder:Bipolar Disorder is a severe and disabling  cyclical psychopathology characterized by manic, hypomanic and depressive states. Affecting 2.2 million Americans, Bipolar Disorder begins in adolescence or early adulthood and continues throughout life. Just as all mental illnesses, Bipolar Disorder falls upon a spectrum of severity and chronicity. Clinical studies report that 80% of Bipolar Disordered adults experience multiple manic episodes throughout their lifespan and 15% end their lives in suicide. Bipolar Disorder is distinguished from Major Depressive Disorder by the presence of manic or hypomanic episodes. Bipolar Disorder is a spectrum of disorders and included in the Diagnostic and Statistical Manual of Mental Disorders [DSM-5] category of Mood Disorders .

Mood Disorders: Mood Disorders are a large, broad spectrum group of clinical syndromes that feature mild to severe mood disturbances, which interfere with a person’s well-being and life functioning. Currently,  Mood Disorders are segmented into two separate groups. These two categories include Unipolar Depressive Disorders [absence of hypomanic or manic episodes] and Bipolar Disorders characterized by experiencing episodic Depression, Hypomania & Mania. Secondary mood disorders are a class of psychiatric mood dysfunctions that occurs due to medical illness or mood/mind altering substances ingestion. Depressive disorders range from major depressive episodes to the mild depression manifestation called Dysthymia.

Bipolar Disorders, sometimes referred to as “Manic Depression”, are combinations of manic, hypomanic, major depressive and mixed episodes. These disorders include Bipolar Disorder I, Bipolar Disorder II, Bipolar Disorder NOS and Cyclothymic Disorder. Bipolar I Disorder is characterized by a history of at least one manic episode and one depressive episode. Bipolar II Disorder is characterized by hypomanic episodes alternating with depressive episodes. Cyclothymic Disorder is a mood disorder that is not as severe or chronic as Bipolar Disorder I or II. Bipolar NOS [Not Otherwise Specified] is a combination of manic, hypomanic and depressive themed episodes that do not meet criteria for the other three mood disorders.

What is Bipolar Disorder

Bipolar Disorder [Bipolar Disorder]: Bipolar Disorder [aka, Manic Depression] is a psychiatric disability that typically involves affective states of Depression, Mania & Hypomania. Although not clinically confirmed, research suggests that Bipolar Disorder is inherited and possibly passed down by the maternal second allele recessive gene [aka, mother] as opposed to the paternal primary allele dominate gene [aka, father]. Given the extreme complexity involving the human genome and dominant/recessive genetic markers, the genetic links  related to Bipolar Disorder have yet to be accurately mapped.

Using a broad description, Bipolar Disorder is defined as  a mood disorder involving  cyclical affective shifts ranging from euphoric feelings, expansive thinking and irritability [aka, Mania] to sadness, hopelessness, helplessness and fatalistic thinking [aka, Depression]. The frequency, severity and behavioral manifestation caused by these mood shifts are indicative of gauging the Bipolar Disorder severity and chronicity. These mood shifts occur over discrete periods of time and vacillate in impact to daily functioning [aka, Rapid Cycling]. A list of Mood Disorder signs and symptoms is as follows:

Manic, Hypomanic, and Depression Phase Symptoms List

Bipolar Disorder Manic Phase Signs & Symptoms

  • 1. Increased energy, activity, restlessness, racing thoughts and pressured speech.
  • 2. Periods of feeling “high”, euphoric and an unrealistic positive mood.
  • 3. Extreme irritability, short tempered and distractibility [aka, Hypomania].
  • 4. A decreased need for sleep without feeling tired.
  • 5. Unrealistic beliefs in one’s abilities and powers [aka, Grandiosity]
  • 6. A pattern of uncharacteristic poor judgment.
  • 7. Periods of behavioral change that is different from baseline behavior.
  • 8. Periods of hypersexual thoughts, fantasies and/or actions.
  • 9. Increased use, abuse or experimentation of mood/mind altering chemicals [aka, cocaine, alcohol, prescription medications].
  • 10. Provocative, agitated,  intrusive, aggressive or obsessive compulsive themed behaviors.
  • 11. Denial of experiencing a manic state.
  • 12. Periods of heightened work/academic performance and creativity.
  • 13. Loss of appetite and/or weight loss.
  • 14. Increased physical activity that may or may not be health driven.
  • 15. Easily distracted by non-relevant environmental events.
  • 16. Increased involvement in high risk or impulsive offline and online activities.
  • 17. Periods of increased online/offline spending sprees & poor financial choices.
  • 18. Increased focus on “pleasure-seeking” offline and online activities.
  • 19. Increased drive to achieve offline and online goals & creative endeavors.

Bipolar Disorder Depression Phase Signs & Symptoms

  • 1. Persistently feeling sad, anxious or empty.
  • 2. Feeling helpless, hopeless or pessimistic.
  • 3. Feelings of guilt, shame and worthlessness.
  • 4. A loss of interest or pleasure in ordinary offline and online activities.
  • 5. A sense of decreased energy marked by feelings of being “slowed down” or fatigued.
  • 6. Difficulty concentrating, remembering or making decisions.
  • 7. Periods of feelings restless, irritable and uncomfortable.
  • 8. Periods of patterned sleep disturbances [Hypersomnia, Hyposomnia].
  • 9. Loss of appetite and weight or increase in appetite [aka, binge eating] and weight gain.
  • 10. Reporting chronic pain or other persistent bodily symptoms.
  • 11. Thoughts of death or suicide, including suicide attempts.
  • 12. Persistently feeling anxiety, worried and nervous.
  • 13. Increased frequency and longevity of weeping.
  • 14. Decreased sexual appetite and/or sexual thoughts, fantasies and/or actions.
  • 15. Increasingly isolated and social activity withdrawal.
  • 16. Marked reduction in physical activity and/or physical coordination.
  • 17. Increase in slowed, jumbled or slurred speech.
  • 18. An Increase in ignoring or avoiding important daily employment/academic tasks.
  • 19. Poor performance at school or work.

a-bipolar-disorder-mood-disorder-dr-internet-safety-dark-psychology-ipredator-michael-nuccitelli-image

What is Rapid Cycling?

Rapid Cycling:Rapid cycling is defined as a pattern of four or more manic, hypomanic or depressive episodes during the course of one year. If these four episodes occur within a months period, it has been termed Ultradian Cycling. As the term suggests, rapid cycling is an accelerated shift in mood swings that shift from mild to intense. Once Rapid Cycling begin, the episode can last from a few hours to several days. The duration for those who have suffered Rapid Cycling report feeling as if they are trapped on an emotional “roller coaster” that they cannot stop or control. Rapid cycling primarily involves experiencing a series of  behaving impulsive, engaging in uncontrollable outbursts and feeling extremely irritable and angry.

In addition to being intense and frightening, Rapid Cycling episodes occur randomly having no predictable pattern. Rapid Cycling differs from other forms of Mood Disorders. People suffering from Rapid Cycling are unique in how they respond to conventional and experimental treatments compared to other people with Bipolar Disorder. With its sudden, random and unpredictable mood changes, Rapid Cycling is more complex and difficult to manage than other types of Bipolar Disorder.

Cyclothymic Disorder

Cyclothymic Disorder: Cyclothymia is a mood disorder that causes people to experience mild to moderate hypomanic and depressive episodes. Using a broad description, Cyclothymia  is a mood disorder involving  cyclical affective shifts ranging from euphoric feelings, expansive thinking and irritability to sadness, hopelessness, helplessness and fatalistic thinking. The frequency, severity and behavioral manifestation caused by these mood shifts are less severe and chronic than Bipolar Disorder. Cyclothymic mood shifts occur over discrete periods of time and vacillate in life impact.

As stated, Cyclothymia is a milder form of Bipolar Disorder involving recurrent mood disturbances that vacillate between Hypomania and Dysthymic Mood. From a diagnostic standpoint, a person only has to experience one hypomanic episode in order to meet DSM-5 criteria for Cyclothymic Disorder. Although only one hypomanic episode is required for diagnosis, most individuals also experience  dysthymic episodes. Cyclothymia is similar to the less severe form of Bipolar II Disorder, whereby mood disturbances manifest most frequently as hypomanic episodes. Given that Cyclothymiacs experience mostly hypomanic episodes, feeling creative and highly efficient, they rarely seek therapeutic assistance. It is only when they experience states of Dysthymia that behavioral healthcare help is sought.

a-bipolar-disorder-mood-disorder-dr-internet-safety-dark-psychology-ipredator-michael-nuccitelli-image

What is Hypomania

Hypomania: Hypomania falls within the Bipolar Disorder spectrum describing the less severe and extreme manifestations of a full blown Bipolar Disorder manic phase. Hypomanic states do not include periods of psychotic and grandiose thinking  and do not cause life and work functioning dysfunction. Hypomania can occur during the Bipolar Disordered person’s progression into full mania or happen in lieu of a full blown manic state. It is during hypomanic states that a Bipolar Disordered person experiences a sense of heightened creativity and performance.

Individuals in a hypomanic state have a decreased need for sleep, are more outgoing, extroverted and competitive combined with having a great deal of energy. Although part of a psychiatric spectrum disturbance, many people who become hypomanic enjoy the experience and feel elated about life. In fact, it also during the hypomanic phase when a Bipolar Disordered person may cease taking their medication and/or engaging in treatment.

Unlike full mania, those in a hypomanic state can function appropriately at work, school and in interpersonal relationships. Related to Bipolar Disorder, hypomania often becomes the precursor to a full blown manic episode and used as a preparation alert by a Bipolar Disordered person’s support system.

A second negative consequence of hypomania involves a Bipolar Disordered person’s loved ones, family and co-workers. Given the Bipolar Disordered person, in a hypomanic state, is not acting psychotic, grandiose, bizarre or abnormal, it is very easy for loved ones to conclude they are “cured”, rehabilitated or far more functional than they really are. Unfortunately, hypomania is a temporary affective state and not a permanent condition.

Following Hypomania, the Bipolar Disordered person progresses into a full blown manic state or returns to their baseline experience generically known as a “normal” state. Just as some experts define hypomania as a stable non-pathological temperament rather than a psychiatric episode, they also differ in their definitions of a Bipolar Disordered person’s “normal” state.

Bipolar & Work Function

The effects of Bipolar Disorder upon a person’s work function can vary widely ranging from exceptional work performance and creative genius to habitual absences, gross negligence and provocative customer relations. Depending on the severity of their episode [aka, manic, hypomanic, depressive], an employee may initiate a sick leave that can span a couple days to several weeks. If their episodic states are mild, an employer may not even recognize their employee is experiencing a low grade mood disturbance. In fact, the vast majority of Bipolar mood shifts an employee experiences are rarely observed by an employer, supervisor or business owner. Most mood disturbances a Bipolar person experiences is intrapsychic and rarely noticed unless intensely observing the person.

Suffering from a mental illness should not prevent or hinder anyone form endeavoring to climb the proverbial corporate ladder. Behavioral healthcare providers, vocational professionals and occupational therapists recommend being mindful of ones strengths, weaknesses and psychiatric limitations. A psychiatric and/or developmental disability does not have to be the defining reason for not applying for an employment position of interest. The key to employment success is taking the time to assess if the skills, aptitudes and work functions are manageable. Just as important is confirming whether or not the employment opportunity includes job functions that may trigger or agitate a person’s dormant Bipolar state.

Within the vast majority of known employment realms lies those opportunities when functioning as an  administrator or manager are available. A strong manager and administrator is essential to the success of any business. They need to have strong planning and organizational skills, while avoiding impulsive behavior and decision making. Having impulsive and intense managers and administrators may come with a price and there are several disadvantages to having such leadership at the helm. Although impulsivity is not chronically pervasive among all mentally ill adults, these counterproductive management traits are central to Bipolar Disorder I, and at a lesser degree, for those who are Bipolar II or Cyclothymic.

Administrators who practice rational, deliberated business management behaviors tend to be more successful in the long run. The key terms describing a manager at risk for not being successful administrating subordinates are impulsive and intense. Impulsive and/or intense management behaviors are at much higher rates of triggering destabilization in the workplace. Impulsive managers change expectations constantly and offer employees minimal levels of consistency regarding what is expected. Instead, employees are left to guess how and when they should respond in employment situations because they are unsure about how his/her manager or management team will respond to their actions.

In relationship to employee relations, an absence of known expectations for employees can make the manager-employee relationship stressful and one that ultimately leaves employees fearful of their own place within the business. For example, impulsive managers who tend to fire employees on a whim may command the fear of their employees, but only out of a sense of necessity and survival. Employees in these situations do not perform their jobs because of loyalty to the manager, but out of fear of losing their job or some other unknown punitive consequences.

Managers, administrators and business owners who act impulsively also tend to lack focus. They jump from one task to the next vacillating between various tasks. In addition to impulsive task attention shifts, the rate of vacillation is directly affected by how the course of their work day is proceeding. These types of managers have no real sense of organization and do not prioritize their activities. This lack of focus is contagious and can affect the entire employee population under the charge of the impulsive manager.

A manager who does not himself focus on the most important tasks does not know how to properly prioritize and delegate responsibility among employees. Employees will too lack this focus and not know which tasks should be the most important because those tasks have not been delegated as such by the manager.

Impulsive managers often have difficulty motivating employees to consistently meet their employment objectives. If employees do not have the focus or know what their expectations are, their ability to meet employment objectives will be severely hampered as a result. Business goals may be occasionally achieved, but usually by the hard work of employees who meet goals despite the impulsive behavior of their manager. Impulsive managers provide employees with little guidance in terms of providing a model for behavior. This leaves employees to figure out their own path to meeting their goals.

Impulsive management behaviors are one of several traits that a supervisor or administrator cannot possess when attempting to mobilize subordinates to successfully complete their employment functions. It is for this reason that when an owner or administrator is considering putting a Bipolar person at the helm of a business operation involving subordinate employees, impulsive management behaviors be confirmed as not being exhibited.

a-bipolar-disorder-mood-disorder-dr-internet-safety-dark-psychology-ipredator-michael-nuccitelli-image

Bipolar Disorder and the “Normal State”

Just all psychopathology, Bipolar Disorder falls upon a spectrum of disability. For those who fall along the mild to moderate side of the Bipolar Disorder spectrum,  feeling “normal” can be experienced between affective shifts. Longitudinal research on Bipolar Disorder suggests that these periods of feeling “normal” can be extended if the person prioritizes a consistent healthy lifestyle, as well as, working closely with his/her healthcare providers.

Although generally accepted that Bipolar Disorder and many other psychiatric disabilities have been part of the fabric making human civilization, no known cure, procedure or methodology has successfully cured Bipolar Disorder. The healthcare industry continues to close in on the causes and correlates of Bipolar Disorder, but no proven cure behavioral and/or medical to date has been successful in developing a cure or means of arresting the illness into a state of dormancy. In fact, opposing  philosophical camps of medical and healthcare experts continue to debate the causes, treatments and even the interpretative experiences of the Bipolar Disorder.

To illustrate the complexity and lack of professional consensus understanding Bipolar Disorder, there are experts who passionately debate what it means for a Bipolar Disordered person to feel “normal” between affective shifts. For some healthcare experts & professionals, they subscribe to the hypothesis that a Bipolar Disordered diagnosed person can live, feel and experience “normality” who is not suffering from a psychiatric illness. They believe that they can be held within an indefinite dormant state provided the patient  prioritizes his/her recovery. Under this premise, recovery is defined as a persistent commitment to  medication monitoring, therapeutic  treated and behavioral observation.

Within the realm of Bipolar Disorder, the “normal” state is described as a period of time when the Bipolar Disordered person is not experiencing a manic, depressive or hypomanic episode. It is during this “normal” state that experts differ in their definition and prognosis.

For some healthcare providers, the “normal” state is defined as how the person would function if they never suffered from Bipolar Disorder. During this “normal” state, the Bipolar Disordered person is non-pathological and can behave at full functioning levels. Even if the Bipolar Disordered person is being helped by psychopharmaceuticals  to enter and remain in a “normal” state, these healthcare providers and scientists subscribe to the notion that the “normal state” is who they would be if they never suffered from Bipolar Disorder.

If the Bipolar Disordered person is assessed or reports being in a “normal” state and he/she acts irrational, impulsive, sullen or narcissistic, it is not caused by the Bipolar Disorder, but due to their own personality constructs, which include both constructive and destructive components.

Similar in philosophy are healthcare providers and pharmaceutical advocates who believe that psychopharmacology treatment can help a Bipolar Disordered person lead a productive life without ever again experiencing states of mania, depression or hypomania. In essence, they believe that medication, therapy and family support are capable of metaphorically “curing” the person of his/her Bipolar Disorder.

Psychiatrists, western trained physicians and pharmaceutical advocates are the predominant segments of professionals who subscribe to this philosophy. It is not out of the ordinary for a western trained physician to tell family members of a Bipolar Disordered person patient that their loved one will be “fine” so as long as he/she takes the recommended medications.

The opposing segment of healthcare providers and scientists do not view the “normal state” of Bipolar Disorder as a full recovery, cure or permanent cessation of psychopathology. To them, the “normal state” is a temporary period of time whereby the Bipolar Disordered person is not experiencing a manic, hypomanic or depressive episode. Although not experiencing these states, they are still at risk for environmental stimulation events triggering a manic, hypomanic or depressive episode. Given the energy and persistence required to habitually prioritize their medication and therapeutic treatments and behavioral plans, being fully compliant 100% of the time cannot be assumed.

Psychologists, holistic and eastern trained physicians and holistic rooted psychiatrists are the predominant segments of professionals who subscribe to this philosophy. For these healthcare providers, they view Bipolar Disorder as a life long illness that must always be prioritized. These professional segments do not subscribe to the notion that psychopharmacology treatment can essentially eliminate future episodes. In fact, it is when Bipolar Disordered persons enter a hypomanic state or conclude that they are cured that medication cessation thoughts become evident.

Combined with loved ones, healthcare providers and a support system that supports the concept of a “Normal State” often encourage or do not dissuade the Bipolar Disordered person from ceasing their medication regimen. For the Bipolar Disordered person’s  loved ones, it is natural for them to be receptive when a medication and/or treatment holiday is considered. Family members and loved ones are encouraged to educate themselves on their loved ones psychiatric dysfunction from an educated consumerism standpoint.

It is important to feel comfortable with the Bipolar Disordered person’s treating healthcare provider. To encourage this relationship, family members and loved ones are recommended to actively educate themselves on new medications, medication management topics, mood disorder spectrum topics and community services.

a-bipolar-disorder-mood-disorder-dr-internet-safety-dark-psychology-ipredator-michael-nuccitelli-image

Resources

bipolar-disorder-dark-psychology-michael-nuccitelli-ipredator

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

home-button-dark psychology-darkside of human consciousness-michael nuccitelli, psy.d.-ipredator

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyberbullying Tactic Bullets by Michael Nuccitelli, Psy.D.

Cyberbullying Tactic Bullets

by

Michael Nuccitelli, Psy.D.

cyberbullying-tactics-bullets-michael-nuccitelli-psy.d.-dark-psychology-ipredator

Cyberbullying Bullets

Simply log into your Google Plus profile and enter the hashtag #CyberbullyingTactics in the search field. Authored by Michael Nuccitelli, Psy.D., NYS licensed psychologist & iPredator construct author, all images and body content, attached in text body of images, are public domain requiring no attribution or author approved permissions. No overt sales copy or covert internet marketing hooks. Only request by author and iPredator Inc. associates is respectfully pass on the information to parents, educators & pediatric professionals. Although the 38 images and tactic descriptions are presented as pediatric events, all 38 are actively used by adults, cause driven adult groups, nefarious corporate competitors and nations seeking to cyber attack other nations using disinformation & social engineering.

Attached to each of the 38 cyberbullying images, available by hashtag, #CyberbullyingTactics, are descriptions of each of the tactics compiled. All images are public domain, require no author attribution and effective at educating children, parents, educators, psychologists and pediatric professionals. If interested, at no cost or requiring personal information, at the content base of all 38 images is a link to iPredator’s cyberbullying tactics webpage if interested in downloading the fully formatted PDF article. Simply click on the “iPredator Cyberbullying Tactics” webpage link, scroll to the base of the webpage and click on the iPredator shield logo to download the PDF article. Also at the base of this post is iPredator’s Cyberbullying Tactics Pinterest Board and Google Plus internet safety image library links.

Message for Trolls: Having spent the last 4 years researching, investigating and tracking online aggressors, ranging from parasitic trolls to online sexual predators, there is little you can do to flame or provoke this writer and iPredator Inc. associates successfully. In fact, if you do Internet Troll, please know that the proverbial “door is open” with pen and paper ready to transcribe forensic data. It has become crystal clear, by the recent published Canadian research, [Personality and Individual Differences, 2014], that you are at a much higher rate of being sadistic, psychopathic, as well as, being plagued by machiavellianism and narcissism. In fact, and this is where the pen and paper comes in, this writer and his colleagues strongly suspect those of you who proudly admit being a troll in your profiles and posts are also pathologically experiencing a deep sense of isolation, insignificance and feelings of smallness. Lastly, and as the great Pink Floyd once wrote long before the Information Age….”Welcome my Son, Welcome to the Machine. Where Have ya Been? It’s all Right we Know Where ya Been!”

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services related to cyberbullying, cyberstalking, cyber harassment, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and cyber deception. Created by a NYS licensed psychologist & forensic consultant, Michael Nuccitelli Psy.D., iPredator is also a human consciousness construct and internet safety website. iPredator Inc.’s internet safety website is SSL [Secure Sockets Layer] certified with an enormous amount of  information for all online users at no cost.

cyberbullying-what-is-cyber-bullying-cyberbullying-prevention-ipredator-image

Cyberbullying Tactics

Cyberbullying continues to grow and devastating Information Age children. Unlike classic bullying, cyberbullying is for the hidden realm of cyberspace. Given all humanity thrives at the beginning of the Information Age, no one knows the depths children will go in their criminal, deviant and deceptive practices to harm other children. Provided below are this writer’s compilation of cyberbullying tactics, used by minors, to harm and victimize other children,

Cyberbullying Definition

Cyberbullying: Cyberbullying is a term used to define recurrent and sustained verbal and/or physical attacks by one or more children towards another child who is unable or unwilling to deescalate the engagement using Information and Communication Technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to deprecate a targeted child. Cyberbullying describes threatening or disparaging communications delivered through ICT. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of information exchanged via ICT and may never involve face-to-face encounters.

By definition, classic & cyberbullying occurs among young people. When an adult is involved as the aggressor, it meets criteria for cyber harassment or cyberstalking, which in many states is a criminal act. Although the terms “bullying” and “cyberbullying” includes adult intimidation behavior in contemporary culture, these describe pediatric behaviors and will not include adult applications in this manuscript. Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, deprecate & defame a targeted child initiated and sustained by another child or group of children. Cyberbullying describes harmful, threatening or disparaging information against a target child delivered through Information and Communications Technology (ICT.) As Information and Communications Technology (ICT) becomes widespread; cyberbullying prevention, education and protection are areas requiring immediate attention. Provided here are this writer’s list of  tactic used by cyberbullies in 2014.

“For those not trained in cyber forensics, internet safety, tech. security and cybercriminal profiling, don’t fool yourself into thinking the tactics used by cyberbullies are merely poor parenting pediatric problems. Every 2014 tactic listed has been, and will be, habitually used by adults engaged in cybercrime, cyberstalking, online sexual predation, internet trolling, social engineering, internet libel, hacking, identity theft, cyber terrorism, internet defamation, libel, hacking, identity theft and every other known form of Information Age crime, deviance, abuse and deception. Only the short sighted, ignorant and uninformed adult will discount these strategies as being irrelevant and only restricted to children.” Michael Nuccitelli, Psy.D. [2014]

cyberbullying-tactics-bullets-michael-nuccitelli-psy.d.-dark-psychology-ipredator
Cyberbullying Tactics Bullet List

CYBERBULLYING TACTIC: EXCLUSION

Exclusion (aka Social Exclusion) is a cyberbullying tactic that is highly effective and directly targets a child’s developmental need to feel accepted and part of a social construct. Social exclusion occurs by indirectly sending a harmful message to the target child that they are not included in social activities without the need for verbal deprecation. As it is well-known children and teens are developmentally fixated being recognized by their peers; the process of designating who is a member of the peer group and who is not included can be devastating to the target child.

CYBERBULLYING TACTIC: FLAMING

Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar language. These online arguments occur in public communication environments for peer bystanders to witness. These environments include discussion boards and groups, chatrooms, and newsgroups. Flaming may have features of a normal message, but its intent is designed differently and flamers endeavor to assert their power or establish a position of dominance asserted against a target child.

CYBERBULLYING TACTIC: EXPOSURE

Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully personal to the target child. Exposure becomes even more detrimental to the target child when the communications posted and displayed publicly contains sensitive personal information or images and video that are sexual in nature. As mobile device technology, images and video becomes more commonplace, the tactic of Exposure is certain to become prevalent.

CYBERBULLYING TACTIC: eINTIMIDATION

eIntimidation is a cyberbully tactic used to inspire fear in the target child by communicating threats that may be direct or implied using email as the vehicle of communication. Upon emailing the target child their threat, the cyberbully also informs other members in the peer group of the alleged threat. The cyberbully sends a threatening e-mail to the target child and then forwards or copies and pastes the threatening message to others of the implied threat. If these threats directly or indirectly suggest physical harm, they move to the tactic of cyberstalking.

CYBERBULLYING TACTIC: CYBER HARASSMENT

Cyber Harassment is sending hurtful messages to the target child that is worded in a severe, persistent or pervasive manner causing the respondent undue concern. These threatening messages are hurtful, frequent and very serious. Like the adult form of cyber harassment, this cyberbullying contact requires three or more harassing messages related by the theme of the message sent. As a cyberbullying tactic, Harassment is both negative in content and frequent in communication.

CYBERBULLYING TACTIC: PHISHING

Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target child into revealing personal and/or financial information about themselves and/or their loved ones. Once the cyberbully acquires this information, they begin to use the information to access their profiles if it may be the target child’s password. Phishing also includes purchasing unauthorized items with the target child’s or parents credit cards.

CYBERBULLYING TACTIC: IMPERSONATION

Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology. Cyberbullies impersonate the target child and make unpopular online comments on social networking sites, forums, message boards and in chat rooms. Using impersonation, cyberbullies also set up websites that include vitriolic information leading to the target child being ostracized or victimized in more classic bullying ways. Often times, the target child is unaware of these events until the tactic has been designed and implemented.

CYBERBULLYING TACTIC: DENIGRATION

Denigration is used in both classic and cyberbullying. Denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target child to intentionally damage their reputation or friendships. Also known as “dissing”, this cyberbullying method is a common element and layer involved in most all of the cyberbullying tactics listed. The primary goal of Denigration is to humiliate & disparage the target child.

CYBERBULLYING TACTIC: MOBILE DEVICE IMAGE SHARING

Mobile Device Image Sharing is not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged children. Children can receive images directly on their phones and then send them to everyone in their address books. Some children actually post these images on video sites, their social networking profiles and other programs for anyone to download or view. With the growth and widespread usage of mobile device technology, this cyberbullying tactic will become prevalent.

CYBERBULLYING TACTIC: IMAGE & VIDEO DISSEMINATION

Non-Consensual Image and Video Dissemination is the usage of images and video as a cyberbullying tactic has become a growing concern that many communities, law enforcement agencies, and schools are taking seriously. Images and videos of the target child are emailed to peers, while others are published on video sites such as YouTube. The primary purpose of this tactic is to humiliate and disparage the target child. As the term denotes, this cyberbullying tactic is non-consensual and the target child either has not given consent or does not know the images or videos are being disseminated.

CYBERBULLYING TACTIC: INTERACTIVE GAMING HARASSMENT

Interactive games on online gaming devices allow children to communicate by chat and live Internet phone with others they are matched with online. Having the ability to exchange information with gaming opponents and fellow peers; cyberbullies verbally abuse others, use threatening and profane language, lock others out of games, pass false information about others. Depending on their computer shrewdness, cyberbullies can also hack into the target child’s accounts. Given the competitive nature of online gaming, children are often unaware of being targeted until fellow players and peers bring the cyberbullying to their attention.


cyberbullying-tactics-bullets-michael-nuccitelli-psy.d.-dark-psychology-ipredator


CYBERBULLYING TACTIC: PORN AND MARKETING LIST INSERTION

Pornography and Marketing List Insertion is a frustrating and embarrassing tactic committed by cyberbullies is signing the target child up to numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists. By doing this, the target child receives hundreds of e-mails and instant messages from pornography sites and advertising companies. Often times, the target child’s parents are made aware of these pornographic emails, assume their child signed up for receipt of pornographic information and punish them without due process.

CYBERBULLYING TACTIC: CYBERSTALKING

Cyberstalking includes threats of harm, intimidation, and/or offensive comments sent through Information and Communications Technology channels. Frequently with cyberstalking, there is a threat or at least a belief by the target child that the cyberbully’s threats of harm are real or could become real offline stalking. Cyberstalking takes harassment to the level of threatening the target child’s safety to an offline environment. Cyberstalking is actually not a cyberbullying tactic because it entails direct and/or indirect physical harm. Of all the cyberbullying tactics listed, cyberstalking is the most dangerous requiring immediate adult attention.

CYBERBULLYING TACTIC: GRIEFING

Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target child and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay. Not specific to cyberbullying, “Griefing” is often a tactic used in interactive video games and used by both cyberbullies and adults engaging in cyber harassment. Similar to Internet Trolls, cyberbullies work in teams to target a child.

CYBERBULLYING TACTIC: PASSWORD THEFT & LOCKOUT

Password Theft & Lockout occurs when a cyberbully steals the target child’s password and begins to chat with other people, pretending to be the target child (a.k.a. Impersonation.) Confident that others think he/she is the target child, they begin to communicate provocative and adversarial messages that are offensive and anger the target child’s friends or strangers. In addition to impersonating the target child, the cyberbully locks out the target child from his/her accounts by changing his/her password. Without having access to his/her username or email account, the target child is unable to close or prove he/she is not the culprit spreading the vitriolic information.

CYBERBULLYING TACTIC: WEB PAGE ASSASSINATION

Web Page Assassination is a tactic whereby the cyberbully creates websites that insult or endanger the target child. The cyberbully creates, designs, and posts web pages specifically designed to insult the target child, their peers or groups of people who share similar characteristics as the target child such as their race, religion or sexual orientation. Although website creation has become an easy task with contemporary information technology software, many cyberbullies have acquired skills enabling them to create websites that are both appealing to viewers, but presenting the target child in a negative light.

CYBERBULLYING TACTIC: VOTING & POLLING BOOTH DEGRADATION

Voting & Polling Booth Degradation is a cyberbullying tactic relying upon when some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post. Cyberbullies use these websites to create web pages that allow others to vote online for categories that are deemed highly embarrassing by the target child. Examples of voting and polling include the ugliest, fattest, dumbest, most sexually promiscuous and a plethora of other deprecating attributes. The primary purpose of this cyberbullying tactic is to encourage group consensus by encouraging peers to engage in disparaging the target child.

CYBERBULLYING TACTIC: BASH BOARDS

Bash Boards are online bulletin boards where children post anything they choose and frequented by both the cyberbully and target child’s peer groups and school acquaintances. At these online bulletin boards, negative and deprecating information is posted by the cyberbully about the target child that is public for all to read and is shared with others. Generally, bash boards encourage postings that are mean, hateful, malicious and embarrassing.

CYBERBULLYING TACTIC: HOODWINKING

Hoodwinking (aka, Trickery) is a tactic similar to phishing in that a cyberbully purposely tricks a target child into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online. Like phishing, Trickery requires the target child to have some element of trust or respect for the cyberbully by agreeing to post sensitive information about them thinking the cyberbully’s rationale will be beneficial and/or positive. With this tactic, the target child is led to believe the sensitive information they consensually give the cyberbully will somehow be presented in a positive light.

CYBERBULLYING TACTIC:

HAPPY SLAPPING Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying. This occurs when a target child or unsuspecting victim is physically attacked or embarrassed in person and an accomplice video records or takes pictures of the incident. The image or video is then posted online at video and social networking sites for public consumption. With the widespread growth of mobile device technology, Happy Slapping is a cyberbullying tactic likely to grow.

CYBERBULLYING TACTIC: TEXT WARS AND ATTACKS

Text Wars and Text Attacks: Text Wars are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target child by sending hundreds of emails or text messages. Besides the emotional toll it can take on the target child, their cell phone charges may escalate causing parental admonishment. Text Wars and Text Attacks are cyberbullying tactics that encourage other children to engage in harmful behaviors against the target child.


cyberbullying-tactics-bullets-michael-nuccitelli-psy.d.-dark-psychology-ipredator


CYBERBULLYING TACTIC: MALICIOUS CODE DISSEMINATION

Malicious Code Dissemination is a cyberbullying tactic whereby malicious information is sent intentionally to a target child to damage or harm their ICT. Many cyberbullies will send viruses, spyware and hacking programs to a target child that can be very costly to repair. The act of sending malicious code as a cyberbullying tactic is usually reserved for children and adolescents advanced in ICT. As Information Age children become more adept with information technology, the tactic of sending malicious codes will become more frequent in the cyberbullies arsenal of online assaults.

CYBERBULLYING TACTIC: WARNING WARS

Warning Wars occur because Internet Service Providers (ISP) offer a way for consumers to report an online user who is posting inappropriate or abusive information. As a tactic used in cyberbullying and harassment, children engage in “warning wars” by making false allegations to the ISP regarding the target child posting inappropriate information. By doing this frequently enough, often times the target child has their profile and/or account suspended by the ISP. Concurrent with this tactic, the cyberbully informs the target child’s parents causing additional admonishment.

CYBERBULLYING TACTIC: SCREEN NAME MIRRORING

Screen Name Mirroring is a cyberbullying tactic used against a target child by constructing a screen name or user name that is very similar to the target child’s name. The name may have additional or removed letters, numbers or combinations of the two to appear the same as the target child’s screen name. With Screen Name Mirroring, the cyberbully uses screen names and user names almost identical to the target child’s requiring the respondent of the information to be attentive in differentiating the minor differences.

CYBERBULLYING TACTIC: CYBER DRAMA

Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages. Most child and adolescent online users are perceptive about telling each other to refrain and will block a user or open a new account when necessary. Some children engaged in Cyber Drama can be psychologically affected due to their negative perception of the information being disseminated. Cyber Drama is best described as a passive aggressive form of cyberbullying.

CYBERBULLYING TACTIC: SEXTING

Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature. It can also refer to text messages of a sexually charged theme. Sexting is both a sexually oriented form of communication and a cyberbullying tactic. As a cyberbullying tactic, the cyberbully creates and/or disseminates sexually themed information about the target child that is both highly embarrassing and humiliating.

CYBERBULLYING TACTIC: PSEUDONYM STEALTH

A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target child. When using instant messaging services like MSN Messenger or Yahoo Messenger, an online user has a nickname they have chosen. Cyberbullies use this same feature to change their name to something that a target child would not expect. Having a nickname, then the cyberbully proceeds to taunt, tease and humiliate the target child without the ability of the target child to know their identity.

CYBERBULLYING TACTIC: INSTANT MESSAGING ATTACKS

Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual. Cyberbullies use IM to send harassing and threatening messages to the target child themed with disparaging information. IM has become a very large part of the social lives of child and adolescent online users. The conversations and conflicts that arise online often give rise to behaviors that are acted out in person during school or at the local shopping mall.

CYBERBULLYING TACTIC: CYBERBULLYING BY PROXY

Cyberbullying by Proxy is a tactic when a cyberbully encourages or persuades others to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyberbullying because adults may become the accomplices to the cyberbully involved in the harassment and do not know they are dealing with a child or someone they may know. A cyberbully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.

CYBERBULLYING TACTIC: SOCIAL MEDIA CYBERBULLYING

Social Media Cyberbullying is a tactic used by which the cyberbully persuades the target child to include them in their “friends” or “buddy” lists and then begins to contact the target child’s friends, peers and loved ones disseminating disparaging information about the target child. The cyberbully will also encourage the target child to accept the cyberbullies accomplices on their “friends” or “buddy” lists without the target child knowing the cyberbully’s true motivations.

CYBERBULLYING TACTIC: DIGITAL PIRACY INCLUSION

Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology. Although most cyberbullies do not fully understand the legal and criminal implications related to Digital Piracy, they are succinctly aware that it is an online behavior to avoid. As a cyberbullying tactic, the cyberbully encourages the target child to engage in Digital Piracy and then reports them either to the authorities, their parents or educators.

CYBERBULLYING TACTIC: TRAGEDY NEWS MIRRORING

Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target child that he/she will allege that the target child is planning and preparing to engage in a violent activity directed at the targeted child’s school or community. Using Information and Communications Technology, the cyberbully disseminates felonious information to the target child’s peers and loved ones that he/she is planning a violent attack.


cyberbullying-tactics-bullets-michael-nuccitelli-psy.d.-dark-psychology-ipredator


CYBERBULLYING TACTIC: SLUT SHAMING

Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target child that can easily be construed as sexually provocative. Often times, the images and video used to shame the target child have been captured without the child’s consent or knowledge. Once these images and videos have been obtained, the cyberbully publishes this information throughout the school and within social networking sites.

CYBERBULLYING TACTIC: CYBERTHREATS

Cyber Threats is a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target child that he or she is in danger from unknown or felonious assailants. Although the term, Cyber Threats, is often equated with Cyber Terrorism, this cyberbullying tactic is based in using threatening or fear provoking information to frighten the target child. The cyberbullying who is informing the target child is rarely the alleged child planning the assault. Given the goal of the cyberbully is to inspire gear in the target child, some cyberbullies will feign suicidal ideations and plans to cause the target child tremendous fear.

CYBERBULLYING TACTIC: TROLLING

Internet Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target child. They appear in all forms of online mediums ranging from online video gaming gatherings, chatrooms and forum discussions. In cases where the cyberbully has a personal relationship with the target child, the cyberbully provokes the child into reactionary behaviors.

CYBERBULLYING TACTIC: SEXTORTION

Sextortion is a cyberbullying tactic by which children exploit other children for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target child. If the target child does not submit to their sexual directives, they threaten to disclose sensitive information to loved ones, employers, educators, peers or organizations if the victim does not submit to their demands.

CYBERBULLYING TACTIC: TWITTER POOPING

Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target child. Given that Tweets are restricted to 140 characters, Twitter Pooping tends to be frequent insults and provocations that often use “net lingo” to fit the harmful message the cyberbully is attempting to convey. Because Tweets can be disseminated in a rapid and hidden manner, cyberbullies are using this method of taunting at greater rates. If the Tweet is creative and skillfully designed, the cyberbully will receive accolades on their skillful use of “net lingo”.

CYBERBULLYING TACTIC: MICRO-VISUAL CYBERBULLYING

Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend. With the growth and expansion of Mobile Device Technology and Smartphones that are mobile and image/video enabled, children will soon become enveloped by the new boom of what has been termed Viddy. Just as Twitter restricts users to text 140 characters, Viddy users are restricted to 15-second video clip recordings to sharing with peers. Given that cyberbullies have become enamored by the speed and dissemination of Twitter, 15-second visual images and video are likely to become the new trend in traumatizing vulnerable children.

Addendum to Reader: Of the 38 cyberbullying tactics listed, tactic Local/National Tragedy Mirroring is the most heinous and least substantiated by this writer. In 2012, the world was traumatized by the events of the Connecticut Elementary School Shooting whereby 20 year old, Adam Lanza, entered Sandy Hook Elementary School and brutally murdered 26 children and adults. In relationship to cyberbullying, this writer was contacted by a mother, shortly after the tragedy. The mother reported that her son was being cyberbullied by another child who was threatening to tell his friends and loved ones that her son was planning to engage in the same event that occurred at Sandy Hook Elementary School.

Given children fail to truly fathom the psychological devastation of mass murder and community violence to society, this writer has included this as a cyberbullying tactic parents and educators need to be prepared for. As it is inevitable there will be future local and national tragedies involving a violent outcome, it is paramount that parents and educators be prepared that cyberbullies will use these events in their attempts to threaten and inspire fear in a target child.

Information Age Children

Information Age Children: Children of the 21st century are targeted via classic bullying, cyberbullying, or a combination of the two. Although cyberbullying is a rapidly growing societal epidemic, classic bullying (aka physical bullying) will remain part of the bullying arena. Given the evolution of digital technology and growth of the internet, cyberbullying has reached epidemic proportions among the pediatric segments of society and has become a permanent weapon in the bully’s toolbox. At the core of all bullying, cyber and classic, are victimization, disparagement and abuse of a targeted child. Child abuse, whether perpetrated by a child or adult, is detrimental to all aspects of pediatric development, following them into adulthood and throughout their lifespan. Given humanity is at the beginning of the Information Age, it is vital for all communities to address the use and abuse of Information and Communications Technology (ICT) by children to harm other children.

What is not apparent and will not be available for 2-3 decades to follow are the cyberbullies who enter adulthood with the ability to harm others using ICT. Prior to the Information Age, classic bullies grew up, became adults and most lead non-violent and productive lives. The question remains is if today’s cyberbullies will develop into adults the same as classic bullies or will they bring with them the tactics and methods they used as children, but applied to the adult environments of cyberspace.

cyberbullying-tactics-bullets-michael-nuccitelli-psy.d.-dark-psychology-ipredator

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyberbullying Risk Assessment (IPI-CB) by Michael Nuccitelli, Psy.D.

a-cyberbullying-risk-assessment-and-inventory-dark-psychology-ipredator-blog-post-image


Cyberbullying Risk Assessment-Michael Nuccitelli, Psy.D.

iPredator Probability Inventory-Cyberbully [IPI-CB]

A cyberbullying risk assessment and prevention education tool called the iPredator Probability Inventory-Cyberbully [IPI-CB] has been updated by iPredator Inc. for 2014. Developed by Michael Nuccitelli Psy.D., a New York State licensed psychologist and forensic psychology consultant, the IPI-CB helps parents, educators and pediatric professionals investigate a child’s vulnerability of being cyberbullied. Cyberbullying is a pediatric social issue impacting thousands of children, families and educators in the United States. Unlike classic bullying that used to be restricted to school grounds and neighborhoods, cyberbullying is 24 hours a day, 7 days a week and 365 days a year for a targeted child.

Michael Nuccitelli Psy.D., a New York State licensed psychologist and forensic psychology consultant, has designed the iPredator Probability Inventory-Cyberbullying (IPI-CB.) The IPI- CB is a 110 question diagnostic and education tool designed to assess a child’s risk of being cyberbullied and their internet safety skills. In addition to developing the IPI-CB, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization.


a-cyberbullying-risk-assessment-and-inventory-dark-psychology-ipredator-blog-post-image


To contact iPredator Inc. directly with questions to order the tool via telephone, please call 347-871-2416. Interested parties can also visit iPredator Inc.’s internet safety website or click on the link provided here.

iPredator Probability Inventory-Cyberbully [IPI-CB] 

iPredator Probability Inventory-Cyberbully [IPI-CB]: The iPredator Probability Inventory-Cyberbully is a 110 question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online preparedness, vulnerability and risk potential for being cyber bullied and/or harassed. Just as all the IPI Assessment Collection inventories, the IPI-CB focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their ICT activities and their practice of the behavioral actions necessary for internet safety and preparedness if cyber attacked. The IPI-CB also explores parental and support system cyberbully protection and prevention tactics employed by loved ones and school officials. A parent, primary caregiver, educator or pediatric professional completes the IPI-CB for children and adolescents ages 6-17.

Once completed, the IPI score, ranging from 0-110, represents the preparedness, vulnerability and risk potential of the child becoming a cyberbully target, cyberbully abuser or cyberbully bystander. The IPI-CB can be used as both a cyberbullying prevention tool for children and a data collection instrument for parents and educators investigating cyberbullying episodes involving their child or student. The IPI-CB also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices. Just as all iPredator Inc.’s internet safety tools, the IPI-CB is based on the Information Age Forensics construct, iPredator, developed by Dr. Nuccitelli. A brief definition of iPredator is as follows:


a-cyberbullying-risk-assessment-and-inventory-dark-psychology-ipredator-blog-post-image


iPredator:
 A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.

II. The use of ICT to obtain, tamper with, exchange and deliver harmful information.

III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.


a-cyberbullying-risk-assessment-and-inventory-dark-psychology-ipredator-blog-post-image


Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)

a-cyberbullying-risk-assessment-and-inventory-dark-psychology-ipredator-blog-post-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

Free Educational iPredator Inventory Links

  1. iPredator Probability Inventory – 330 (IPI-330)
  2. iPredator Probability Inventory – Adult (IPI-A)
  3. iPredator Probability Inventory – Business (IPI-B)
  4. iPredator Probability Inventory – Cyberbully (IPI-CB)
  5. iPredator Probability Inventory – Cyberbully Abuser (IPI-CBA)
  6. iPredator Probability Inventory – Cybercrime (IPI-C)
  7. iPredator Probability Inventory – Cyberstalking (IPI-CS)
  8. iPredator Probability Inventory – Educator (IPI-E)
  9. iPredator Probability Inventory – Internet Predator (IPI-IP)
  10. iPredator Probability Inventory – Pediatric (IPI-P)
  11. iPredator Probability Inventory – Psychologist (IPI-PSY)
  12. iPredator Probability Inventory – Teen (IPI-T)

Free Educational iPredator Checklist Links

  1. Adult Internet Safety Checklist (AISC)
  2. Business Internet Safety Checklist (BISC)
  3. Cyberbully Abuser Checklist (CBAC)
  4. Cyberbullying Target Checklist (CBTC)
  5. Cybercrime Protection Checklist (CCPC)
  6. Cyberstalker Identification Interview (CSII)
  7. Cyberstalking Prevention Checklist (CSPC)
  8. Digital Reputation Protection Checklist (DRPC)
  9. Educator Internet Safety Checklist (EISC)
  10. Internet Safety Checklist Psychologist (ISCP)
  11. Online Predator Prevention Checklist (OPPC)
  12. Parent Cyber Safety Checklist (PCSC)
  13. Pediatric Internet Safety Checklist (PISC)
  14. Teen Internet Safety Checklist (TISC)

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Internet Addiction – Telephonic Internet Addiction Screening

Internet Addiction

Telephonic Internet Addiction Screening

a-telephonic-internet-addiction-screenings-dark-psychology-internet-safety-ipredator-post-image

Telephonic Internet Addiction Screening (TIAS)

The Telephonic Internet Addiction Screening is a confidential assessment offered by NYS licensed psychologist & iPredator author, Michael Nuccitelli, Psy.D. An online user, a loved one or significant other completes the Internet Addiction Risk Checklist [IARC] and reviews the results, along with advice on courses of action with Dr. Nuccitelli.

Internet Addiction and Internet Use Gaming Disorder are synonyms describing an online users potential to become compulsive dependent upon the internet and other forms of Information and Communications Technology. Michael Nuccitelli Psy.D., a New York State licensed psychologist and author of the Information Age Forensics construct, iPredator, has developed a diagnostic screening tool, Internet Addiction Risk Checklist (IARC), to assess if a child or adult online user is engaging in pathological internet use. Along with the IARC, if previously completed, Dr. Nuccitelli conducts telephonic internet addiction screenings offering his professional advice on an effective course of action.


a-telephonic-internet-addiction-screenings-dark-psychology-internet-safety-ipredator-post-image

Telephonic Internet Addiction Screening Link

Although there is an ongoing controversy among healthcare professionals and organizations regarding the existence of a formal internet addiction disorder, the reality is a growing number of online users are experiencing signs and symptoms suggestive of a an Information and Communications Technology (ICT) compulsive dependency. These negative consequences are problematic, self-destructive and harmful to the afflicted online user’s loved ones, peers and associates.

Interested parties are encouraged, but not required, to visit iPredator Inc.’s internet safety website, iPredator, and complete Dr. Nuccitelli’s Internet Addiction Risk Checklist (IARC). For direct access to the checklist, please click on the following hyperlink: Internet Addiction Risk Checklist (IARC)

Upon completion, contact iPredator Inc. by phone at 347-871-2416 or email Dr. Nuccitelli directly at drnucc@ipredatorinc.com. Consumers are contacted within 24 hours to schedule a telephonic consultation.

The cost of a Telephonic Internet Addiction Screening (TIAS) is $200.00 (USD), takes 60-90 minutes to complete and includes all follow-up contacts. Given that healthcare has yet to agree upon a formal definition or even the existence of an Internet Addiction Disorder, provided here is Dr. Nuccitelli’s Internet Abuse and Internet Dependence definitions.


a-telephonic-internet-addiction-screenings-dark-psychology-internet-safety-ipredator-post-image


Internet Abuse:
Internet Abuse is an umbrella concept defining a child or adult’s compulsive and progressive abuse of the internet and electronic devices designed to obtain, exchange or disseminate information. Although the internet is the predominate arena in which Internet Abuse takes place, electronic devices and communications channels not internet enabled are also included in the definition. Internet Abuse causes dysfunctional cognitive, affective, behavioral & perceptual intrapersonal consequences accompanied with employment, academic, familial, peer & intimate partner interpersonal consequences.

On a continuum of severity, ranging from absent to mild, cessation of internet and/or electronic device usage causes withdrawal symptomatology, psychological and/or physiological, combined with perceptual tolerance. Also on a continuum of severity, internet abusive online users engage in criminal, deviant and/or deceptive online activities ranging from absent to severe.

Internet Dependence: Internet Dependence is an umbrella concept defining a child or adult’s compulsive and progressive dependency upon the internet and electronic devices designed to obtain, exchange or disseminate information. Although the internet is the predominate arena in which Internet Dependence takes place, electronic devices and communications channels not internet enabled are also included in the definition. Internet Dependence causes dysfunctional cognitive, affective, behavioral & perceptual intrapersonal consequences accompanied with employment, academic, familial, peer & intimate partner interpersonal consequences.

On a continuum of severity, ranging from mild to severe, cessation of internet and/or electronic device usage causes withdrawal symptomatology, psychological and/or physiological, combined with perceptual tolerance. Also on a continuum of severity, internet dependent online users engage in criminal, deviant and/or deceptive online activities ranging from mild to severe.

a-telephonic-internet-addiction-screenings-dark-psychology-internet-safety-ipredator-post-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.


a-telephonic-internet-addiction-screenings-dark-psychology-internet-safety-ipredator-post-image

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Pin It on Pinterest