TV SHOWS
SHOWS BY SUBJECT
DON'T MISS
TOP SHOWS
VIDEOS
Don't Miss
Most Viewed
How to Make Crack
Show: Drugs Inc.Loaded Luggage
Show: To Catch a SmugglerUzbek Hideout
Show: 21st Century Sex SlavesDiana: In Her Own Words Trailer
Show: Diana: In Her Own WordsGrowing Up Butterfly
Show: Great MigrationsMake It, Take It
Show: Drugs Inc.Inside 9/11: Zero Hour
Show: Inside 9/11Black Dolphin Prison
Show: Inside: Russia's Toughest PrisonsElephant Attack
Show: Ultimate Predators
PHOTOS
Photo of the day
Most Viewed
Meet the Tuna.com Crew
Show: Wicked TunaMeet the JFK Officers
Show: To Catch a SmugglerBorder Security Season 2
Show: Border SecurityTraffickers, Addicts and DEA
Show: Drugs Inc.Holocaust Artifact Mystery
Show: Human Lampshade: A Holocaust MysteryTravel To Area 51
Show: Inside Area 51’s SecretsHeroin
Show: Drugs Inc.
Michael Nuccitelli, Psy.D. is the author of the dark side of cyberspace concept called iPredator (2010). iPredator is a cyberbullying, cyberstalking and cybercriminal minds concept that presents eight types of online assailant. With permission from Dr. Nuccitelli, pasted here is the definition.
iPredator Definition
IPredator is now part of Njalla! Same core team, now with more privacy services such as VPS and domain names, and a much better infrastructure! It was obviously going to happen!:-) If you want to know details about the switch, go to the more detailed blog post about it! IPredator: a person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). IPredators are driven by deviant fantasies, desires for power, control, and retribution, religious fanaticism, political reprisal.
iPredator: a person, group, or nation who, directlyor indirectly, engages in exploitation, victimization, coercion, stalking,theft, or disparagement of others using Information and CommunicationsTechnology (ICT). iPredators are driven by deviant fantasies, desires forpower, control, and retribution, religious fanaticism, political reprisal,psychiatric illness, perceptual distortions, peer acceptance, or personal andfinancial gain. iPredators can be any age or gender and are not bound byeconomic status, race, religion, or national heritage. Their sole requirementto get started in this dark dimension is an internet connection.
Central to the concept is the premise that information age criminals, deviants, and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyberterrorist, internet troll, online child pornography consumer/distributor, or a person engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
A. A self-awareness of causing harm to others, directly or indirectly, using ICT. B. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. C. A general understanding of cyberstealth used to engage in criminal or deviant activities or to profile, locate, stalk, and engage a target.
Predators Schedule
Unlike human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. The primary differentiators of this very modern kind of predation are also threefold: the unlimited distance over which data can be conveyed, the immediacy with which the data can be conveyed, and the unlimited scope of data that can be conveyed. The importance of these three vectors of capability cannot be overstated.
In pre-information age societies, by contrast, a predator’smalicious activity was essentially local, slow-moving, and technologicallyconstrained; the predator was limited to the area he could cover by car, to usean emblematic example, needed careful wooing or “casing” of his victim, and wasrestricted by the limitations of relatively crude technologies like thetelephone.
In the abstract and artificial electronic universe known ascyberspace, none of these restrictive qualifiers obtain. Furthermore, there isa fourth advantage that ICT offers iPredators: anonymity. On the internet it iseasy for iPredators to actively design online profiles and diversionary tacticsto remain undetected and untraceable.
At his educational internet safety website, he offers a ton of free information for parents, schools and all online users. After reading Dr. Nuccitelli’s concept; these are my conclusions.
IT is out there- and I am not talking about Instructional Technology- but the Internet- you know-the World Wide Web. And while it is chock filled with useful information, it is also a quagmire, a cesspool of people eager to take your money- and your virginity – if they could. Instead they want your Master Card, Visa or American Express (mine left home without me) and some predators want to lure young girls in, seduce them, proposition them and force them to use those cameras for nefarious purposes.
Dr. Michael Nuccitelli has written a very important, and cogent concept that parents and teachers and even academic institutions should read- because- well- millions of people are on the Internet and danger lurks everywhere. Parents need to monitor whatever their children are watching on the Internet- because it is loaded with pornography, and traps and seductions. Teachers need to understand that the Internet is in some instances a worthwhile reference source- but it can also be a trap- a place where sexploitation can occur and a place where one mistake can “go viral” and impact someone for the rest of their lives. Teachers and parents need to work together to make sure that children are not used, abused or exploited and not exposed to anything inappropriate.
Dr. Nuccitelli has had extensive experience working with those who have been used, abused and exploited and have had major difficulties with scams, and various other traps on the Internet. He has written a cogent, comprehensive paper that will help parents, teachers and even university professors assist in the proper use of the Internet and guard against those malicious abusers and exploiters out there. We must all be safe out there on the Internet and children, adolescents and even adults must be cautioned, taught and instructed about appropriate behavior on the Internet. I recommend it most highly.
Kuma Games I Predator
To download, save or print free PDF copies of Dr. Nuccitelli’s work; click the “Visit iPredator” button to be redirected to his internet safety website. Once on the page, click on the blue download button for the hyperlinked version or the black text only download button best for printing. Be sure to bookmark his site as he has an enormous amount of educational content.
Michael F. Shaughnessy, Eastern New Mexico University Professor of Education
Ipredator Vpn
Related Posts
- The curse of ‘white oil’: electric vehicles’ dirty secret
Posted on Dec 12, 2020
- Covid: Secondary school pupils in London, Kent and Essex hotspots urged to get tested
Posted on Dec 12, 2020
- DR. SHIVA: ON THE SUBJECT OF MASKS
Posted on Dec 12, 2020
- What Does the Latest Election News Tell Us?
Posted on Dec 12, 2020