Advertisement
mfrantz

Untitled

Jan 22nd, 2018
600
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 98.06 KB | None | 0 0
  1.  
  2. <!DOCTYPE html>
  3. <!--[if IE 6]>
  4. <html id="ie6" lang="en-US" prefix="og: http://ogp.me/ns#">
  5. <![endif]-->
  6. <!--[if IE 7]>
  7. <html id="ie7" lang="en-US" prefix="og: http://ogp.me/ns#">
  8. <![endif]-->
  9. <!--[if IE 8]>
  10. <html id="ie8" lang="en-US" prefix="og: http://ogp.me/ns#">
  11. <![endif]-->
  12. <!--[if !(IE 6) | !(IE 7) | !(IE 8) ]><!-->
  13. <html lang="en-US" prefix="og: http://ogp.me/ns#">
  14. <!--<![endif]-->
  15. <head>
  16. <meta charset="UTF-8" />
  17.  
  18. <meta http-equiv="X-UA-Compatible" content="IE=edge">
  19. <link rel="pingback" href="https://darkpsychology.co/xmlrpc.php" />
  20.  
  21. <!--[if lt IE 9]>
  22. <script src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/themes/Divi/js/html5.js" type="text/javascript"></script>
  23. <![endif]-->
  24.  
  25. <script type="text/javascript">
  26. document.documentElement.className = 'js';
  27. </script>
  28.  
  29. <script>var et_site_url='https://darkpsychology.co';var et_post_id='3159';function et_core_page_resource_fallback(a,b){"undefined"===typeof b&&(b=a.sheet.cssRules&&0===a.sheet.cssRules.length);b&&(a.onerror=null,a.onload=null,a.href?a.href=et_site_url+"/?et_core_page_resource="+a.id+et_post_id:a.src&&(a.src=et_site_url+"/?et_core_page_resource="+a.id+et_post_id))}
  30. </script><title>Cyberbullying by Proxy-Michael Nuccitelli, Psy.D.</title>
  31.  
  32. <!-- This site is optimized with the Yoast SEO plugin v6.1.1 - https://yoa.st/1yg?utm_content=6.1.1 -->
  33. <meta name="description" content="Visit Dark Psychology to download, at no cost, a blog post about Cyberbullying by Proxy authored by Michael Nuccitelli, Psy.D. of iPredator Inc."/>
  34. <meta name="keywords" content="cyberbullying by proxy, cyberbullying, dark psychology, forensic psychology, criminal psychology, michael nuccitelli psy.d., csi: cyber, ipredator, ipredator inc., internet safety"/>
  35. <link rel="canonical" href="https://darkpsychology.co/cyberbullying-by-proxy/" />
  36. <link rel="publisher" href="https://plus.google.com/+DarkPsychologyCoSite/about"/>
  37. <meta property="og:locale" content="en_US" />
  38. <meta property="og:type" content="article" />
  39. <meta property="og:title" content="Cyberbullying by Proxy-Michael Nuccitelli, Psy.D." />
  40. <meta property="og:description" content="Visit Dark Psychology to download, at no cost, a blog post about Cyberbullying by Proxy authored by Michael Nuccitelli, Psy.D. of iPredator Inc." />
  41. <meta property="og:url" content="https://darkpsychology.co/cyberbullying-by-proxy/" />
  42. <meta property="og:site_name" content="Dark Psychology - Criminal, Deviant &amp; Cybercriminal Minds" />
  43. <meta property="article:publisher" content="https://www.facebook.com/pages/The-iPredator/314877728534332" />
  44. <meta property="article:author" content="https://www.facebook.com/MichaelNuccitelli.PsyD" />
  45. <meta property="article:tag" content="bullying cyber" />
  46. <meta property="article:tag" content="bullying is" />
  47. <meta property="article:tag" content="cyber bullying" />
  48. <meta property="article:tag" content="cyber bullying articles" />
  49. <meta property="article:tag" content="cyber bullying or bullying" />
  50. <meta property="article:tag" content="cyber bullying statistics" />
  51. <meta property="article:tag" content="cyberbullying" />
  52. <meta property="article:tag" content="cyberbullying by proxy" />
  53. <meta property="article:tag" content="cyberbullying definition" />
  54. <meta property="article:tag" content="cyberbullying facts" />
  55. <meta property="article:tag" content="cyberbullying laws" />
  56. <meta property="article:tag" content="cyberbullying prevention" />
  57. <meta property="article:tag" content="dark psychology" />
  58. <meta property="article:tag" content="Dr. Michael Nuccitelli" />
  59. <meta property="article:tag" content="ipredator inc." />
  60. <meta property="article:tag" content="michael nuccitelli" />
  61. <meta property="article:tag" content="michael nuccitelli psy.d." />
  62. <meta property="article:section" content="Blog" />
  63. <meta property="article:published_time" content="2013-11-04T09:19:20-05:00" />
  64. <meta property="article:modified_time" content="2017-03-20T10:20:40-05:00" />
  65. <meta property="og:updated_time" content="2017-03-20T10:20:40-05:00" />
  66. <meta property="og:image" content="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//dark-psychology-criminal-deviant-cybercriminal-minds-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-16.png" />
  67. <meta property="og:image:secure_url" content="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//dark-psychology-criminal-deviant-cybercriminal-minds-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-16.png" />
  68. <meta property="og:image:width" content="1200" />
  69. <meta property="og:image:height" content="600" />
  70. <meta name="twitter:card" content="summary_large_image" />
  71. <meta name="twitter:description" content="Visit Dark Psychology to download, at no cost, a blog post about Cyberbullying by Proxy authored by Michael Nuccitelli, Psy.D. of iPredator Inc." />
  72. <meta name="twitter:title" content="Cyberbullying by Proxy-Michael Nuccitelli, Psy.D." />
  73. <meta name="twitter:site" content="@TheiPredator" />
  74. <meta name="twitter:image" content="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//dark-psychology-criminal-deviant-cybercriminal-minds-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-16.png" />
  75. <meta name="twitter:creator" content="@TheiPredator" />
  76. <script type='application/ld+json'>{"@context":"http:\/\/schema.org","@type":"WebSite","@id":"#website","url":"https:\/\/darkpsychology.co\/","name":"Dark Psychology - Criminal, Deviant &amp; Cybercriminal Minds","potentialAction":{"@type":"SearchAction","target":"https:\/\/darkpsychology.co\/?s={search_term_string}","query-input":"required name=search_term_string"}}</script>
  77. <script type='application/ld+json'>{"@context":"http:\/\/schema.org","@type":"Organization","url":"https:\/\/darkpsychology.co\/cyberbullying-by-proxy\/","sameAs":["https:\/\/www.facebook.com\/pages\/The-iPredator\/314877728534332","https:\/\/www.linkedin.com\/in\/ipredator","https:\/\/plus.google.com\/+DarkPsychologyCoSite\/about","https:\/\/www.youtube.com\/user\/ipredatorteam","https:\/\/www.pinterest.com\/ipredator\/","https:\/\/twitter.com\/TheiPredator"],"@id":"#organization","name":"iPredator Inc.","logo":"https:\/\/darkpsychology.co\/wp-content\/uploads\/\/2014\/10\/ipredator-inc-nys-internet-safety-company-michael-nuccitelli-authored-concepts-and-images-internet-safety-for-kids-text-image.png"}</script>
  78. <!-- / Yoast SEO plugin. -->
  79.  
  80. <link rel='dns-prefetch' href='//fonts.googleapis.com' />
  81. <link rel='dns-prefetch' href='//s.w.org' />
  82. <link rel="alternate" type="application/rss+xml" title="Dark Psychology - Criminal, Deviant &amp; Cybercriminal Minds &raquo; Feed" href="https://darkpsychology.co/feed/" />
  83. <link rel="alternate" type="application/rss+xml" title="Dark Psychology - Criminal, Deviant &amp; Cybercriminal Minds &raquo; Comments Feed" href="https://darkpsychology.co/comments/feed/" />
  84. <script type="text/javascript">
  85. window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/darkpsychology.co\/wp-includes\/js\/wp-emoji-release.min.js?ver=1505865967"}};
  86. !function(a,b,c){function d(a,b){var c=String.fromCharCode;l.clearRect(0,0,k.width,k.height),l.fillText(c.apply(this,a),0,0);var d=k.toDataURL();l.clearRect(0,0,k.width,k.height),l.fillText(c.apply(this,b),0,0);var e=k.toDataURL();return d===e}function e(a){var b;if(!l||!l.fillText)return!1;switch(l.textBaseline="top",l.font="600 32px Arial",a){case"flag":return!(b=d([55356,56826,55356,56819],[55356,56826,8203,55356,56819]))&&(b=d([55356,57332,56128,56423,56128,56418,56128,56421,56128,56430,56128,56423,56128,56447],[55356,57332,8203,56128,56423,8203,56128,56418,8203,56128,56421,8203,56128,56430,8203,56128,56423,8203,56128,56447]),!b);case"emoji":return b=d([55358,56794,8205,9794,65039],[55358,56794,8203,9794,65039]),!b}return!1}function f(a){var c=b.createElement("script");c.src=a,c.defer=c.type="text/javascript",b.getElementsByTagName("head")[0].appendChild(c)}var g,h,i,j,k=b.createElement("canvas"),l=k.getContext&&k.getContext("2d");for(j=Array("flag","emoji"),c.supports={everything:!0,everythingExceptFlag:!0},i=0;i<j.length;i++)c.supports[j[i]]=e(j[i]),c.supports.everything=c.supports.everything&&c.supports[j[i]],"flag"!==j[i]&&(c.supports.everythingExceptFlag=c.supports.everythingExceptFlag&&c.supports[j[i]]);c.supports.everythingExceptFlag=c.supports.everythingExceptFlag&&!c.supports.flag,c.DOMReady=!1,c.readyCallback=function(){c.DOMReady=!0},c.supports.everything||(h=function(){c.readyCallback()},b.addEventListener?(b.addEventListener("DOMContentLoaded",h,!1),a.addEventListener("load",h,!1)):(a.attachEvent("onload",h),b.attachEvent("onreadystatechange",function(){"complete"===b.readyState&&c.readyCallback()})),g=c.source||{},g.concatemoji?f(g.concatemoji):g.wpemoji&&g.twemoji&&(f(g.twemoji),f(g.wpemoji)))}(window,document,window._wpemojiSettings);
  87. </script>
  88. <meta content="Divi v.3.0.95" name="generator"/><style type="text/css">
  89. img.wp-smiley,
  90. img.emoji {
  91. display: inline !important;
  92. border: none !important;
  93. box-shadow: none !important;
  94. height: 1em !important;
  95. width: 1em !important;
  96. margin: 0 .07em !important;
  97. vertical-align: -0.1em !important;
  98. background: none !important;
  99. padding: 0 !important;
  100. }
  101. </style>
  102. <link rel='stylesheet' id='et-gf-open-sans-css' href='https://fonts.googleapis.com/css?family=Open+Sans:400,700' type='text/css' media='all' />
  103. <link rel='stylesheet' id='et_monarch-css-css' href='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/plugins/monarch/css/style.css?ver=1515081726' type='text/css' media='all' />
  104. <link rel='stylesheet' id='divi-fonts-css' href='https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext' type='text/css' media='all' />
  105. <link rel='stylesheet' id='divi-style-css' href='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/themes/Divi/style.css?ver=1516120744' type='text/css' media='all' />
  106. <link rel='stylesheet' id='dashicons-css' href='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-includes/css/dashicons.min.css?ver=1515081613' type='text/css' media='all' />
  107. <link rel='stylesheet' id='wp_edit_column-styles-css' href='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/plugins/wp-edit/css/column-style.css?ver=1515081762' type='text/css' media='all' />
  108. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-includes/js/jquery/jquery.js?ver=1466532603'></script>
  109. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1466532603'></script>
  110. <link rel='https://api.w.org/' href='https://darkpsychology.co/wp-json/' />
  111. <link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://darkpsychology.co/xmlrpc.php?rsd" />
  112. <link rel="wlwmanifest" type="application/wlwmanifest+xml" href="https://darkpsychology.co/wp-includes/wlwmanifest.xml" />
  113.  
  114. <link rel='shortlink' href='https://darkpsychology.co/?p=3159' />
  115. <link rel="alternate" type="application/json+oembed" href="https://darkpsychology.co/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F" />
  116. <link rel="alternate" type="text/xml+oembed" href="https://darkpsychology.co/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;format=xml" />
  117. <script type="text/javascript">
  118. window._wp_rp_static_base_url = 'https://rp.zemanta.com/static/';
  119. window._wp_rp_wp_ajax_url = "https://darkpsychology.co/wp-admin/admin-ajax.php";
  120. window._wp_rp_plugin_version = '3.6.1';
  121. window._wp_rp_post_id = '3159';
  122. window._wp_rp_num_rel_posts = '6';
  123. window._wp_rp_thumbnails = true;
  124. window._wp_rp_post_title = 'Cyberbullying+by+Proxy-Michael+Nuccitelli%2C+Psy.D.';
  125. window._wp_rp_post_tags = ['ipredator+inc.', 'cyberbullying+facts', 'cyber+bullying+or+bullying', 'michael+nuccitelli+psy.d.', 'cyberbullying+prevention', 'cyberbullying', 'bullying+is', 'dr.+michael+nuccitelli', 'cyberbullying+definition', 'cyber+bullying+articles', 'michael+nuccitelli', 'cyberbullying+laws', 'cyber+bullying+statistics', 'bullying+cyber', 'dark+psychology', 'cyberbullying+by+proxy', 'cyber+bullying', 'cyberbullying+posts', 'blog', 'featured', 'relationship', 'bulli', 'digit', 'h2', 'children', 'mobil', 'classic', 'millenni', 'cyberbulli', 'commun', 'internet', 'technolog', 'onlin', 'color', 'educ'];
  126. </script>
  127. <link rel="stylesheet" href="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/plugins/related-posts/static/themes/vertical-m.css?version=3.6.1" />
  128. <script type="text/javascript">
  129. (function(url){
  130. if(/(?:Chrome\/26\.0\.1410\.63 Safari\/537\.31|WordfenceTestMonBot)/.test(navigator.userAgent)){ return; }
  131. var addEvent = function(evt, handler) {
  132. if (window.addEventListener) {
  133. document.addEventListener(evt, handler, false);
  134. } else if (window.attachEvent) {
  135. document.attachEvent('on' + evt, handler);
  136. }
  137. };
  138. var removeEvent = function(evt, handler) {
  139. if (window.removeEventListener) {
  140. document.removeEventListener(evt, handler, false);
  141. } else if (window.detachEvent) {
  142. document.detachEvent('on' + evt, handler);
  143. }
  144. };
  145. var evts = 'contextmenu dblclick drag dragend dragenter dragleave dragover dragstart drop keydown keypress keyup mousedown mousemove mouseout mouseover mouseup mousewheel scroll'.split(' ');
  146. var logHuman = function() {
  147. var wfscr = document.createElement('script');
  148. wfscr.type = 'text/javascript';
  149. wfscr.async = true;
  150. wfscr.src = url + '&r=' + Math.random();
  151. (document.getElementsByTagName('head')[0]||document.getElementsByTagName('body')[0]).appendChild(wfscr);
  152. for (var i = 0; i < evts.length; i++) {
  153. removeEvent(evts[i], logHuman);
  154. }
  155. };
  156. for (var i = 0; i < evts.length; i++) {
  157. addEvent(evts[i], logHuman);
  158. }
  159. })('//darkpsychology.co/?wordfence_lh=1&hid=FE61800B443EDF486F391F19CBE8ED58');
  160. </script><style type="text/css" id="et-social-custom-css">
  161. .et_monarch .widget_monarchwidget .et_social_networks ul li, .et_monarch .widget_monarchwidget.et_social_circle li i { background: #636363 !important; } .et_monarch .widget_monarchwidget.et_social_rounded .et_social_icons_container li:hover, .et_monarch .widget_monarchwidget.et_social_rectangle .et_social_icons_container li:hover, .et_monarch .widget_monarchwidget.et_social_circle .et_social_icons_container li:hover i.et_social_icon { background: #0811af !important; } .et_monarch .widget_monarchwidget .et_social_icon, .et_monarch .widget_monarchwidget.et_social_networks .et_social_network_label, .et_monarch .widget_monarchwidget .et_social_sidebar_count { color: #ffffff; } .et_monarch .widget_monarchwidget .et_social_icons_container li:hover .et_social_icon, .et_monarch .widget_monarchwidget.et_social_networks .et_social_icons_container li:hover .et_social_network_label, .et_monarch .widget_monarchwidget .et_social_icons_container li:hover .et_social_sidebar_count { color: #ffffff !important; }
  162. </style><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0" /><link rel="shortcut icon" href="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//favicon-dark-psychology-criminal-deviant-cybercriminal-minds-ipredator-inc.-new-york-32-x-32.png" /><style type="text/css" id="custom-background-css">
  163. body.custom-background { background-color: #636363; }
  164. </style>
  165. <link rel="stylesheet" id="et-divi-customizer-global-cached-inline-styles" href="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/cache/et/global/et-divi-customizer-global-15161454069529.min.css" onerror="et_core_page_resource_fallback(this, true)" onload="et_core_page_resource_fallback(this)" /></head>
  166. <body class="post-template-default single single-post postid-3159 single-format-standard custom-background et_monarch et_pb_button_helper_class et_fullwidth_nav et_non_fixed_nav et_show_nav et_hide_primary_logo et_secondary_nav_enabled et_secondary_nav_two_panels et_pb_gutter osx et_pb_gutters3 et_primary_nav_dropdown_animation_fade et_secondary_nav_dropdown_animation_fade et_pb_footer_columns4 et_header_style_centered et_smooth_scroll et_right_sidebar et_divi_theme et_minified_js et_minified_css">
  167. <div id="page-container">
  168.  
  169. <div id="top-header">
  170. <div class="container clearfix">
  171.  
  172.  
  173. <div id="et-info">
  174. <span id="et-info-phone">347-871-2416</span>
  175.  
  176. <a href="mailto:info@ipredatorinc.com"><span id="et-info-email">info@ipredatorinc.com</span></a>
  177.  
  178. <ul class="et-social-icons">
  179.  
  180. <li class="et-social-icon et-social-facebook">
  181. <a href="https://www.facebook.com/pages/The-iPredator/314877728534332" class="icon">
  182. <span>Facebook</span>
  183. </a>
  184. </li>
  185. <li class="et-social-icon et-social-twitter">
  186. <a href="https://twitter.com/theipredator" class="icon">
  187. <span>Twitter</span>
  188. </a>
  189. </li>
  190. <li class="et-social-icon et-social-google-plus">
  191. <a href="https://plus.google.com/+DarkPsychologyCoSite/" class="icon">
  192. <span>Google</span>
  193. </a>
  194. </li>
  195.  
  196. </ul> </div> <!-- #et-info -->
  197.  
  198.  
  199. <div id="et-secondary-menu">
  200. <div class="et_duplicate_social_icons">
  201. <ul class="et-social-icons">
  202.  
  203. <li class="et-social-icon et-social-facebook">
  204. <a href="https://www.facebook.com/pages/The-iPredator/314877728534332" class="icon">
  205. <span>Facebook</span>
  206. </a>
  207. </li>
  208. <li class="et-social-icon et-social-twitter">
  209. <a href="https://twitter.com/theipredator" class="icon">
  210. <span>Twitter</span>
  211. </a>
  212. </li>
  213. <li class="et-social-icon et-social-google-plus">
  214. <a href="https://plus.google.com/+DarkPsychologyCoSite/" class="icon">
  215. <span>Google</span>
  216. </a>
  217. </li>
  218.  
  219. </ul>
  220. </div> </div> <!-- #et-secondary-menu -->
  221.  
  222. </div> <!-- .container -->
  223. </div> <!-- #top-header -->
  224.  
  225.  
  226. <header id="main-header" data-height-onload="66">
  227. <div class="container clearfix et_menu_container">
  228. <div class="logo_container">
  229. <span class="logo_helper"></span>
  230. <a href="https://darkpsychology.co/">
  231. <img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//dark-psychology-criminal-deviant-cybercriminal-minds-ipredator-inc.-170x130.png" alt="Dark Psychology - Criminal, Deviant &amp; Cybercriminal Minds" id="logo" data-height-percentage="54" />
  232. </a>
  233. </div>
  234. <div id="et-top-navigation" data-height="66" data-fixed-height="40">
  235. <nav id="top-menu-nav">
  236. <ul id="top-menu" class="nav et_disable_top_tier"><li id="menu-item-15823" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-home menu-item-15823"><a href="https://darkpsychology.co/">HOME</a></li>
  237. <li id="menu-item-12818" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-12818"><a title="Contact Us-iPredator Inc. New York Internet Safety Company" href="https://darkpsychology.co/contact-us/">CONTACT</a></li>
  238. <li id="menu-item-15652" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-15652"><a href="#">ABOUT</a>
  239. <ul class="sub-menu">
  240. <li id="menu-item-13424" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13424"><a title="About Us-iPredator Inc. &#038; Michael Nuccitelli, Psy.D." href="https://darkpsychology.co/about-us-ipredator/">About Us</a></li>
  241. <li id="menu-item-11931" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-11931"><a title="Troll Man-An Internet Safety Super Villain for Kids (K-5)" href="https://darkpsychology.co/troll-man-trollman/">Troll Man</a></li>
  242. <li id="menu-item-11932" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-11932"><a title="Cyber Tyger-Internet Safety Super Hero for Kids-2015" target="_blank" href="https://darkpsychology.co/cyber-tyger-2015/">Cyber Tyger</a></li>
  243. <li id="menu-item-13083" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13083"><a title="Troll Man vs. Cyber Tyger-Internet Safety for Kids" href="https://darkpsychology.co/troll-man-cyber-tyger/">Troll Man vs. Cyber Tyger</a></li>
  244. <li id="menu-item-15061" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-15061"><a href="https://darkpsychology.co/educational-media/">Educational Media</a></li>
  245. <li id="menu-item-13321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13321"><a title="Terms of Service-iPredator Inc. and Dark Psychology Blog" href="https://darkpsychology.co/terms-of-service/">Terms of Service</a></li>
  246. <li id="menu-item-13319" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13319"><a title="Privacy Policy-iPredator Inc. and Dark Psychology Blog" href="https://darkpsychology.co/privacy-policy/">Privacy Policy</a></li>
  247. </ul>
  248. </li>
  249. <li id="menu-item-15656" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-15656"><a href="#">DARK SIDE</a>
  250. <ul class="sub-menu">
  251. <li id="menu-item-2642" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2642"><a title="Dark Psychology-Darkside of Human Consciousness Definition" href="https://darkpsychology.co/dark-psychology/">Dark Psychology Definition</a></li>
  252. <li id="menu-item-13079" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13079"><a title="Psychopaths-Online Psychopathy Checklist &#038; Traits" href="https://darkpsychology.co/online-psychopathy-checklist/">Online Psychopathy</a></li>
  253. <li id="menu-item-13077" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13077"><a title="Inside the Criminal Mind-Inside Cybercriminal Minds" href="https://darkpsychology.co/cybercriminal-minds/">Cybercriminal Minds</a></li>
  254. <li id="menu-item-4351" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-4351"><a title="Online Deception | Cyber Deception Page | Dark Psychology" target="_blank" href="https://darkpsychology.co/online-deception/">Online Deception</a></li>
  255. <li id="menu-item-4528" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-4528"><a href="https://darkpsychology.co/five-dark-psychology-ipredator-definitions/">Definitions</a></li>
  256. <li id="menu-item-1105" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-1105"><a href="https://darkpsychology.co/criminal-mind-posts/">Criminal Mind Posts</a></li>
  257. <li id="menu-item-15054" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-15054"><a href="https://darkpsychology.co/psychopathy-posts/">Psychopathy Posts</a></li>
  258. <li id="menu-item-1104" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-1104"><a href="https://darkpsychology.co/cybercriminal-mind-posts/">Cybercriminal Mind Posts</a></li>
  259. </ul>
  260. </li>
  261. <li id="menu-item-15657" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-15657"><a href="#">IPREDATORS</a>
  262. <ul class="sub-menu">
  263. <li id="menu-item-17088" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-17088"><a title="Cyber Bullying-31 Free Images by Michael Nuccitelli, Psy.D." target="_blank" href="https://darkpsychology.co/michael-nuccitelli-cyber-bullying/">Cyberbullying Images</a></li>
  264. <li id="menu-item-13149" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-13149"><a title="42 Cyberbullying Facts, Examples &#038; Tactics" href="https://darkpsychology.co/cyberbullying-facts/">Cyberbullying Examples</a>
  265. <ul class="sub-menu">
  266. <li id="menu-item-13078" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13078"><a title="Michael Nuccitelli, Psy.D. | What is Cyberbullying?" href="https://darkpsychology.co/michael-nuccitelli-cyberbullying/">What is Cyberbullying</a></li>
  267. <li id="menu-item-15056" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-15056"><a href="https://darkpsychology.co/cyberbullying-posts/">Cyberbullying Posts</a></li>
  268. </ul>
  269. </li>
  270. <li id="menu-item-15059" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-15059"><a href="https://darkpsychology.co/cyberstalking-posts/">Cyberstalking Posts</a></li>
  271. <li id="menu-item-13081" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-13081"><a title="Internet Trolls-An Overview of the Internet Troll Profile" href="https://darkpsychology.co/internet-trolls/">Internet Trolls</a>
  272. <ul class="sub-menu">
  273. <li id="menu-item-9205" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-9205"><a title="Troll-100 Plus Types and Examples of Internet Trolls" target="_blank" href="https://darkpsychology.co/troll/">100+ Troll Types</a></li>
  274. <li id="menu-item-15057" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-15057"><a href="https://darkpsychology.co/internet-troll-posts/">Troll Posts</a></li>
  275. </ul>
  276. </li>
  277. <li id="menu-item-9342" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-9342"><a title="Michael Vara, LNM Radio Network &#038; Horokane-iPredators? " href="https://darkpsychology.co/lnm-radio-network-michael-vara-ipredator/">Media iPredators</a></li>
  278. <li id="menu-item-8492" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-8492"><a title="LNM Radio Network-Internet Radio Troll Tactics?" href="https://darkpsychology.co/lnm-radio-network-internet-radio-troll/">Internet Radio Trolls</a></li>
  279. <li id="menu-item-15060" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-15060"><a href="https://darkpsychology.co/online-predation-posts/">Online Predator Posts</a></li>
  280. <li id="menu-item-13080" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13080"><a title="Troll Triad &#8211; An Internet Troll Group Dynamic Construct" target="_blank" href="https://darkpsychology.co/troll-triad">Troll Triad</a></li>
  281. <li id="menu-item-16516" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-16516"><a title="LNM Radio Network, Michael Vara-Troll Triad-Crier Type" href="https://darkpsychology.co/lnm-radio-network-michael-vara-troll-triad/">LNM Troll</a></li>
  282. </ul>
  283. </li>
  284. <li id="menu-item-15661" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-15661"><a href="#">TOOLS</a>
  285. <ul class="sub-menu">
  286. <li id="menu-item-13082" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-13082"><a title="Internet Safety Tools-Cyber Attack Risk Assessments " href="https://darkpsychology.co/internet-safety-tools-overview/">Internet Safety Tools</a></li>
  287. <li id="menu-item-1733" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-1733"><a title="Internet Safety Tools-Cyber Attack Risk Assessment Posts " href="https://darkpsychology.co/internet-safety-tool-posts/">Tool Posts</a></li>
  288. </ul>
  289. </li>
  290. <li id="menu-item-16032" class="menu-item menu-item-type-post_type menu-item-object-page current_page_parent menu-item-16032"><a href="https://darkpsychology.co/blog/">BLOG</a></li>
  291. <li id="menu-item-16489" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-16489"><a title="Donate to iPredator Inc. Internet Safety Initiatives" href="https://darkpsychology.co/donations/">DONATIONS</a></li>
  292. </ul> </nav>
  293.  
  294.  
  295.  
  296. <div id="et_top_search">
  297. <span id="et_search_icon"></span>
  298. </div>
  299.  
  300. <div id="et_mobile_nav_menu">
  301. <div class="mobile_nav closed">
  302. <span class="select_page">Select Page</span>
  303. <span class="mobile_menu_bar mobile_menu_bar_toggle"></span>
  304. </div>
  305. </div> </div> <!-- #et-top-navigation -->
  306. </div> <!-- .container -->
  307. <div class="et_search_outer">
  308. <div class="container et_search_form_container">
  309. <form role="search" method="get" class="et-search-form" action="https://darkpsychology.co/">
  310. <input type="search" class="et-search-field" placeholder="Search &hellip;" value="" name="s" title="Search for:" /> </form>
  311. <span class="et_close_search_field"></span>
  312. </div>
  313. </div>
  314. </header> <!-- #main-header -->
  315.  
  316. <div id="et-main-area">
  317.  
  318. <div id="main-content">
  319. <div class="container">
  320. <div id="content-area" class="clearfix">
  321. <div id="left-area">
  322. <article id="post-3159" class="et_pb_post post-3159 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-cyberbullying-posts category-featured-posts tag-bullying-cyber tag-bullying-is tag-cyber-bullying tag-cyber-bullying-articles tag-cyber-bullying-or-bullying tag-cyber-bullying-statistics tag-cyberbullying tag-cyberbullying-by-proxy tag-cyberbullying-definition tag-cyberbullying-facts tag-cyberbullying-laws tag-cyberbullying-prevention tag-dark-psychology tag-dr-michael-nuccitelli tag-ipredator-inc tag-michael-nuccitelli tag-michael-nuccitelli-psy-d">
  323. <div class="et_post_meta_wrapper">
  324. <h1 class="entry-title">Cyberbullying by Proxy-Michael Nuccitelli, Psy.D.</h1>
  325.  
  326. <p class="post-meta"> by <span class="author vcard"><a href="https://darkpsychology.co/author/admin/" title="Posts by Michael Nuccitelli, Psy.D." rel="author">Michael Nuccitelli, Psy.D.</a></span> | <span class="published">Nov 4, 2013</span></p>
  327. </div> <!-- .et_post_meta_wrapper -->
  328.  
  329. <div class="entry-content">
  330. <div itemscope itemtype="http://schema.org/BlogPosting"><h1 style="text-align: center;"><span style="font-size: 32pt; color: #0000ff;">Cyberbullying by Proxy</span></h1>
  331. <h1 style="text-align: center;">Michael Nuccitelli, Psy.D.</h1>
  332. <p><img class="aligncenter size-full wp-image-14205" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-by-proxy-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator1.png" alt="cyberbullying-by-proxy-michael-nuccitelli-psy.d.-dark-psychology-ipredator-inc.-new-york" width="754" height="720" srcset="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-by-proxy-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator1.png 754w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-by-proxy-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator1-500x477.png 500w" sizes="(max-width: 754px) 100vw, 754px" /></p>
  333. <h2 style="text-align: center;">Cyberbullying Prevention</h2>
  334. <p><span style="font-size: 16px;"><b>1.</b> Cyberbullying, like classic bullying, is about human relationships involving the balance of <a href="http://www.ncdsv.org/images/powercontrolwheelnoshading.pdf">power and control</a>. Children who cyberbully have an easier time establishing authority, rule and dominance using Information and Communications Technology concurrent with a captive peer audience.<b> </b></span></p>
  335. <p><span style="font-size: 16px;"><b>2.</b> Those that cyberbully desire making the <span class="removed_link" title="http://www.statisticbrain.com/cyber-bullying-statistics/">target child</span> feel there is something wrong with them. Having the internet with rapid potential at their disposal, they have many digital avenues to succeed.</span></p>
  336. <p><span style="font-size: 16px;"><b>3.</b> Cyberbullying is perceived more intensely for todays &#8220;<i>Always Online Generation</i>”. Given that digital technology increases the spread of information rapidly, children are aware that potential adverse information about them can have devastating effects on their reputation (aka, <a href="http://www.safetyweb.com/stop-cyber-bullying">Online Reputation</a>).</span></p>
  337. <p><span style="font-size: 16px;"><b>4.</b> The Millennial or <a href="http://www.visibleu.com/2009/10-facts-you-should-know-about-online-generations/">Online Generation</a> is increasingly communicating in ways that are often unknown by adults and away from their supervision using mobile digital technology. Without monitoring, cyberbullying can run rampant.</span></p>
  338. <p><span style="font-size: 16px;"><b>5.</b> Cyberbullying may be educated to children as a cowardly because cyberbullies can hide behind the anonymity that the internet provides. If educating the child using this line of reasoning occurs, it is mandatory to address that classic bullying is not the courageous alternative.</span></p>
  339. <p><span style="font-size: 16px;"><b>6.</b> Cyberbullies can communicate their hurtful messages to a very wide audience with remarkable speed that the target child cannot halt with <a href="http://www.youth.luton.gov.uk/13.cfm?p=1089">Cyberbullying by Proxy</a>.</span></p>
  340. <p><span style="font-size: 16px;"><b>7.</b> Cyberbullying has far fewer tangible consequences using information technologies to bully others. Parents and caregivers need to be mindful of the difficulty compiling evidence necessary to prove their child is engaged in cyberbullying others.</span></p>
  341. <p><span style="font-size: 16px;"><b>8.</b> Cyberbullies do not have to own their actions, as it is usually very difficult to identify them, so they do not fear punishment for their actions. With advancements in <a href="http://www.theguardian.com/technology/2013/jun/12/internet-anonymity-chic-google-hidden">information technology</a>, it can be very difficult compiling identity specific evidence on who they are and their geographic location.</span></p>
  342. <p><span style="font-size: 16px;"><b>9.</b> Cyberbullying is often outside of the legal reach of schools and school boards as this behavior often happens outside of school on home computers or via mobile devices. Compounding this difficulty is some cyberbullies do not even reside within the same town county or state as the target child making legal and law enforcement involvement very difficult.</span></p>
  343. <p><span style="font-size: 16px;"><b>10.</b> <a href="http://www.ncpc.org/resources/files/pdf/bullying/cyberbullying.pdf">Victims</a> of cyberbullying are often fearful of telling others because they fear that the bullying may actually become worse if they tell adults or school officials. For this reason, many targeted children suffer in silence.</span></p>
  344. <p><span style="font-size: 16px;"><b>11.</b> <a href="http://www.trynova.org/crime-victim/specializations/bullying/">Victims</a> of cyberbullying are afraid to report to adults about being cyber bullied, as they fear that adults will over-react and take away their mobile phone, computer and/or internet access.</span></p>
  345. <p><span style="font-size: 16px;"><b>12.</b> In most cases, cyberbullies know the target child, but the target child may not know their cyberbullies.</span></p>
  346. <p><span style="font-size: 16px;"><b>13.</b> Cyberbullies may or may not bully the target child through physical, verbal, emotional or psychological means that are more easily identified. Using <a href="http://www.slideshare.net/damarissepulveda/cyber-bullying-101-for-parents">Cyberbullying by Proxy</a>, cyberbullies can involve their friends to be the primary assailants of the bullying tactics.</span></p>
  347. <p><span style="font-size: 16px;"><b>14.</b> With the dawn of mobile devices and <a href="http://www.wisegeek.com/what-is-wireless-internet-access.htm">wireless internet access</a>, communications have become ubiquitous.</span></p>
  348. <p><span style="font-size: 16px;"><b>15.</b> Cyberbullying can happen any time and any place for children. Home is no longer a refuge from negative peer pressure and abuse. <a href="http://www.netsmartz.org/cyberbullying">Cyberbullying</a> in the Information Age offers mobile device technology, which will continue to expand at a rapid pace. </span></p>
  349. <p><span style="font-size: 16px;"><b>16.</b> In 2011, <a href="http://www.cdc.gov/ncezid/pdf/annual-report.pdf">94%</a> of 14-15 year olds regularly maintain a social networking profile. Cyberbullying has become the weapon of choice for bullies in the place of more overt harassment or classic bullying.</span></p>
  350. <p><span style="font-size: 16px;"><b>17.</b> When adults bully children or teenagers online, it is defined as cyberstalking or cyber harassment and punishable as criminal in most states. At present, cyberstalking and cyber harassment by children are not regarded punishable by minors.</span></p>
  351. <p><span style="font-size: 16px;"><b>18.</b> It is hard for children and adults to distinguish their online identity and their offline identity as two separate forums. Unfortunately, both children and adults sometimes lose sight of the differences. When this occurs, they are more susceptible to psychological distress, cyberbullying and <a href="http://www.rhumphreylaw.com/documents/2011-Cyber-Crimes.pdf">criminal cyber attacks</a>.</span></p>
  352. <p><img class="aligncenter wp-image-3160 size-medium" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/11/cyberbullying-by-proxy-cyberbullying-cyberbullying-facts-cyberbullying-prevention-ipredator-300x300.png" alt="cyberbullying-by-proxy-michael-nuccitelli-psy.d.-dark-psychology-ipredator-inc.-new-york" width="300" height="300" srcset="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/11/cyberbullying-by-proxy-cyberbullying-cyberbullying-facts-cyberbullying-prevention-ipredator-300x300.png 300w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/11/cyberbullying-by-proxy-cyberbullying-cyberbullying-facts-cyberbullying-prevention-ipredator-150x150.png 150w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/11/cyberbullying-by-proxy-cyberbullying-cyberbullying-facts-cyberbullying-prevention-ipredator.png 400w" sizes="(max-width: 300px) 100vw, 300px" /></p>
  353. <h2 align="center">Cyberbully Prevention Strategies</h2>
  354. <p><span style="font-size: 16px;"><b>1.</b> Teach your child to use the <a href="http://www.internetsafety.com/parental-control-software-for-social-networks.php">blocking function</a> at their social networking sites. After blocking the cyberbully, teach your child to not reply to their messages and report their abusive messages to the site administrators.</span></p>
  355. <p><span style="font-size: 16px;"><b>2.</b> Block the cyberbully. Most <a href="http://www.officer.com/article/10812089/mobile-device-safety-and-security-tips">mobile devices</a> have settings that allow your child to electronically block emails, IMs or text messages from specific people. Teach them to do this often if anyone they interact with behaves aggressively.</span></p>
  356. <p><span style="font-size: 16px;"><b>3.</b> Limit access to your child&#8217;s technology if necessary. Many children who are bullied cannot resist the temptation to check web sites, their phones, message boards and <a href="http://www.cyberbullying.org/examples_st.html">chat rooms</a> to see if there are new messages posted by the cyberbully or friends privy to the cyberbullying.</span></p>
  357. <p><span style="font-size: 16px;"><b>4.</b> Some companies allow parents to turn off <a href="http://en.wikipedia.org/wiki/Short_Message_Service">text messaging services</a> during certain hours, which can give bullied children a break and allow parents to relax during these off hours.</span></p>
  358. <p><span style="font-size: 16px;"><b>5.</b> Know your child&#8217;s online world. Check their postings and the sites they frequent, and be aware of how they spend their time online. A simple cost free monitoring mechanism is to set up a <a href="https://www.google.com/alerts">Google Alerts</a> using your child&#8217;s name and hometown. This way, you will be sent messages to your inbox regarding some of your child&#8217;s online activities. </span></p>
  359. <p><span style="font-size: 16px;"><b>6.</b> Educate your child on the importance of <a href="https://www.commonsensemedia.org/blog/internet-safety-and-privacy">privacy</a>. Most importantly, educate your child on the importance of not sharing <a href="http://www.washington.edu/doit/online-safety-tips-protecting-your-personal-information">personal information online</a>, even with friends, intimate partners or love interests.</span></p>
  360. <p><span style="font-size: 16px;"><b>7. </b>Encourage them to safeguard their passwords at all costs other than sharing them with parents in case of an emergency.</span></p>
  361. <p><span style="font-size: 16px;"><b>8.</b> An effective way of monitoring your child&#8217;s status online is making sure that your child has an aunt, uncle, or other adult they really like and respect as a friend that will discuss their online activities.</span></p>
  362. <p><span style="font-size: 16px;"><b>9.</b> Keep the home computer in a public area of the home and limit the use of cell phones and games to negotiate times and schedules.</span></p>
  363. <p><span style="font-size: 16px;"><b>10. </b>To reduce cyberbully and potential online sexual predator contacts, it is important to change the home online schedule rules to prevent potential assailants from learning the times your child will be online.</span></p>
  364. <p><span style="font-size: 16px;"><span style="color: #0000ff;">&#8220;<i>To be a human being means to possess a feeling of inferiority which constantly presses towards its own conquest. The greater the feeling of inferiority that has been experienced, the more powerful is the urge for conquest and the more violent the emotional agitation.</i>&#8220;</span> Alfred Adler (1870-1937) </span></p>
  365. <p><img class="aligncenter size-full wp-image-14207" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-grows-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator.png" alt="cyberbullying-by-proxy-michael-nuccitelli-psy.d.-dark-psychology-ipredator-inc.-new-york" width="600" height="478" srcset="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-grows-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator.png 600w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-grows-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator-500x398.png 500w" sizes="(max-width: 600px) 100vw, 600px" /></p>
  366. <h2 align="center">Cyberbullying by Proxy</h2>
  367. <p><span style="font-size: 16px;">Cyberbullies who misuse the internet to target other children often enlist friends to act as accomplices and has been termed, <a href="http://www.identity-theft-scout.com/cyber-bullying.html">Cyberbullying by Proxy</a>. These accomplices, unfortunately, are often unsuspecting. They know they are communicating irate or provocative messages, but do not realize they are being manipulated by a cyber harasser, cyberbully and iPredator. That is the beauty of this type of scheme. The attacker merely prods the issue by creating indignation or emotion on the part of others, sits back and let others do their dirty work.</span></p>
  368. <p><span style="font-size: 16px;">Then, when legal action or other punitive measures are initiated against the accomplice, the <a href="http://www.prweb.com/releases/ipredator/cyberbullying-tactics/prweb10323768.htm">cyberbully</a> can claim that they never instigated anything and no one was acting on their behalf. They claim innocence and blame their accomplices are a scapegoat is needed for slaughter. If the accomplices are made as scapegoats, they have no legal legs to stand on once their IP addresses and other identification forms of evidence are compiled. It is brilliant and very powerful. It is also one of the most dangerous kinds of <a href="http://cyberbullying.us/">cyber harassment</a> or cyberbullying.</span></p>
  369. <p><span style="font-size: 16px;">Another method of Cyberbullying by Proxy is using an Internet Service Provider (ISP) to do their bidding. Cyberbullies do this using AOL, MSN or another ISP as their &#8220;proxy&#8221; or accomplice. When they engage in a &#8220;notify&#8221; or &#8220;warning&#8221; wars, they are using this method to get the ISP to view the victim as the provocateur. A notify or warning war is when one child provokes another, until the victim lashes back. When they do, the real attacker, the cyberbully, clicks the warning or notify button on the text screen.</span></p>
  370. <p><span style="font-size: 16px;">This captures the communication and flags it for the ISP&#8217;s review. If the ISP finds that, the communication violated their terms of service agreement (which most do), they may take action. Some accounts allow several warnings before formal action, but the results are the same. The ISP does the cyberbullies dirty work when they close or suspend the target child&#8217;s account for a &#8220;terms of service&#8221; violation. Most knowledgeable ISPs know this and are careful to see if the child warned is really being set-up. Sometimes cyberbullies use the target child&#8217;s own parents as unwitting accomplices. They provoke the target child and when they lash back, the cyberbully saves the communication and forwards it to the parents of the target child. The parents often believe what they read, and without having evidence of the prior provocations, think that their own child instigated the conflict.</span></p>
  371. <p><span style="font-size: 16px;">This tactic works just as easily in a <a href="http://www.cga.ct.gov/2010/rpt/2010-R-0450.htm">school disciplinary environment</a>, where the cyberbully hopes to have the school blame the target child. That is why those in authority should never take any cyberbullying at face value before completing a thorough investigation.</span></p>
  372. <p><img class="aligncenter size-full wp-image-14200" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-by-proxy-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator-4.png" alt="cyberbullying-by-proxy-michael-nuccitelli-psy.d.-dark-psychology-ipredator-inc.-new-york" width="700" height="507" srcset="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-by-proxy-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator-4.png 700w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-by-proxy-cyberbullying-bullying-michael-nuccitelli-psy.d.-dark-psychology-ipredator-4-500x362.png 500w" sizes="(max-width: 700px) 100vw, 700px" /></p>
  373. <h2 align="center">Top Cyberbully Motivations Quick List</h2>
  374. <ul>
  375. <li><strong><span style="font-size: 16px;">1. Anger</span></strong></li>
  376. <li><strong><span style="font-size: 16px;">2. Revenge</span></strong></li>
  377. <li><strong><span style="font-size: 16px;">3. Frustration</span></strong></li>
  378. <li><strong><span style="font-size: 16px;">4. Entertainment</span></strong></li>
  379. <li><strong><span style="font-size: 16px;">5. Boredom</span></strong></li>
  380. <li><strong><span style="font-size: 16px;">6. Ample Free Time</span></strong></li>
  381. <li><strong><span style="font-size: 16px;">7. For Laughs</span></strong></li>
  382. <li><strong><span style="font-size: 16px;">8. To Get A Reaction</span></strong></li>
  383. <li><strong><span style="font-size: 16px;">9. By Accident</span></strong></li>
  384. <li><strong><span style="font-size: 16px;">10. To Torment</span></strong></li>
  385. <li><strong><span style="font-size: 16px;">11. Ego</span></strong></li>
  386. <li><strong><span style="font-size: 16px;">12. Social Standing</span></strong></li>
  387. <li><strong><span style="font-size: 16px;">13. Righting Wrongs</span></strong></li>
  388. <li><strong><span style="font-size: 16px;">14. Perceived Chivalry</span></strong></li>
  389. </ul>
  390. <p><span style="font-size: 16px;"><span style="color: #0000ff;">&#8220;<i>In defense of our persons and properties under actual violation, we took up arms. When that violence shall be removed, when hostilities shall cease on the part of the aggressors, hostilities shall cease on our part also.</i>&#8220;</span> Thomas Jefferson (1743-1826)</span></p>
  391. <h2 style="text-align: center;">Cyberbullying iPredator Website Pages</h2>
  392. <p><strong>Cyberbully Triad: </strong>The Cyberbullying Triad is a term used to describe the three typologies of children that harm other children using Information Technology. This writer’s terms to categorize cyberbullies include the Ignorant Cyberbully, Righteous Cyberbully &amp; Narcissistic Cyberbully. Of the three profiles, the Narcissistic Cyberbully is the most problematic having the highest probability of engaging in malevolent and nefarious online activities as an adult. <strong>Link:</strong> <a href="https://www.ipredator.co/cyberbully-triad/">Cyberbully Triad-Types of Cyberbullying &amp; Cyberbully Facts</a></p>
  393. <p><strong>Cyberbully Mind: </strong>Cyberbullying is defined as the use of Information and Communication Technology (ICT) in the commission of verbal and/or physical attacks, by one or more children towards another child, who is unable or unwilling to deescalate the engagement. Given that the vast majority of this abuse occurs in cyberspace, the factors, drives and motivations for cyberbullying are extremely complex. Provided is a brief introduction to the psychodynamics of cyberbullying and the cyberbully mind. <strong>Link:</strong> <a href="https://www.ipredator.co/cyberbully-minds/">Cyberbully Minds-Psychodynamics of Cyberbullying</a></p>
  394. <p><strong>Cyberbullying Tactics: </strong>Cyberbullying continues to grow devastating both pre-pubescent and adolescent children. Unlike pre-Information Age bullying, cyberbullies and their tactics are primarily designed and instituted in the hidden realm of cyberspace. No one knows the depths Information Age children will venture in their practices to harm other children. NYS Licensed Psychologist, Michael Nuccitelli, Psy.D., offers his 2015 Cyberbullying Tactics for review and free download.<strong> Link:</strong> <a href="https://www.ipredator.co/cyberbullying-examples/">Cyberbullying Facts-Cyberbullying Examples &amp; Bullying</a></p>
  395. <p><strong>Cyberbullying Facts: </strong>Cyberbullying facts, prevention education tips &amp; resources are presented for download, at no cost, for parents, educators &amp; pediatric professionals. Author of the Information Age Forensics construct, iPredator, Dr. Nuccitelli has compiled helpful information regarding both the cyberbully and cyberbully victim.<strong> Link:</strong> <a href="https://www.ipredator.co/cyber-bullying/">Cyberbullying-What is Cyber Bullying &amp; Cyberbullying Facts</a></p>
  396. <p><img class="aligncenter wp-image-2317 size-thumbnail" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/cyberbullying-cyberbullying-prevention-cyberbullies-ipredator-300x300.png" alt="cyberbullying-by-proxy-michael-nuccitelli-psy.d.-dark-psychology-ipredator-inc.-new-york" width="300" height="300" srcset="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/cyberbullying-cyberbullying-prevention-cyberbullies-ipredator-300x300.png 300w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/cyberbullying-cyberbullying-prevention-cyberbullies-ipredator-150x150.png 150w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/cyberbullying-cyberbullying-prevention-cyberbullies-ipredator.png 325w" sizes="(max-width: 300px) 100vw, 300px" /></p>
  397. <h2 style="text-align: center;">Michael Nuccitelli, Psy.D.</h2>
  398. <p><a href="https://www.ipredator.co/michael-nuccitelli/">Michael Nuccitelli, Psy.D.</a> is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the <a href="http://www.adler.edu/">Adler University</a>. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime &amp; the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, <a href="https://drinternetsafety.com/">iPredator</a>, and two blogs, <a href="https://darkpsychology.co/">Dark Psychology</a> &amp; <a href="https://www.ipredator.co/">Dr. Internet Safety</a> offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.</p>
  399. <h2 style="text-align: center;">iPredator Inc.</h2>
  400. <p><a href="https://darkpsychology.co/about-us-ipredator/">iPredator Inc.</a> is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products &amp; services to consumers and organizations on <a href="https://darkpsychology.co/cyberbullying-facts/">cyberbullying</a>, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology &amp; Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from <a href="https://www.ipredator.co">online assailants</a>.</p>
  401. <p>Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of <a href="https://darkpsychology.co/internet-safety-tools-overview/">internet safety tools</a>, cyber attack risk assessments and <a href="https://darkpsychology.co/internet-safety-tools-overview/">diagnostic tests</a> available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, <a href="https://darkpsychology.co/cyber-tyger-2015/">Cyber Tyger</a>, <a href="https://darkpsychology.co/troll-man-trollman/">Troll Man </a>and the <a href="https://darkpsychology.co/troll-man-cyber-tyger/">Cyber Tyger vs. Troll Man</a> struggle are used to introduce basic internet safety concepts.</p>
  402. <p>Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at <a href="mailto:info@ipredatorinc.com">info@ipredatorinc.com</a>.</p>
  403. <ul>
  404. <li>Google Plus: <a href="https://plus.google.com/+iPredatorCo">iPredator</a></li>
  405. <li>Google Plus: <a href="https://plus.google.com/+DarkPsychologyCoSite/about">Dark Psychology</a></li>
  406. <li>Google Plus: <a href="https://plus.google.com/+MichaelNuccitelli/about">Michael Nuccitelli, Psy.D.</a></li>
  407. <li>Linked In: <a href="https://www.linkedin.com/in/iPredator">iPredator</a></li>
  408. <li>Twitter: <a href="https://twitter.com/TheiPredator">TheiPredator</a></li>
  409. <li>YouTube: <a href="https://www.youtube.com/user/iPredatorTeam">iPredator Team</a></li>
  410. <li>Facebook: <a href="http://www.facebook.com/pages/The-iPredator/314877728534332">The iPredator</a></li>
  411. <li>Pinterest: <a href="https://www.pinterest.com/ipredator/">iPredator Inc.</a></li>
  412. </ul>
  413. <p><em><span style="color: #0000ff;">&#8220;The Information Age technocentric concept of being &#8220;connected&#8221; is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.&#8221;</span> </em>Michael Nuccitelli, Psy.D. (2014)</p>
  414. <ul>
  415. <li><strong>IPREDATOR INC.</strong></li>
  416. <li>CEO: Michael Nuccitelli, Psy.D.</li>
  417. <li>NYS Licensed Psychologist</li>
  418. <li>New York, USA</li>
  419. <li>Ph:(347) 871-2416</li>
  420. <li>Email:<a href="mailto:drnucc@ipredatorinc.com">drnucc@ipredatorinc.com</a></li>
  421. <li>Website:<a href="https://www.ipredator.co/">iPredator</a></li>
  422. <li>Blog I:<a href="https://darkpsychology.co/">Dark Psychology</a></li>
  423. <li>Blog II:<a href="https://drinternetsafety.com/"> Internet Safety</a></li>
  424. </ul>
  425. <h3 align="center"><span style="color: #800000; font-size: 24pt;"><em>PROTECT, PREVENT &amp; PREVAIL OVER IPREDATORS!</em></span></h3>
  426. <p align="center"><img class="aligncenter wp-image-2327 size-full" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/ipredator-inc-cyberbullying-bullying-ipredator-image.png" alt="cyberbullying-by-proxy-michael-nuccitelli-psy.d.-dark-psychology-ipredator-inc.-new-york" width="509" height="108" srcset="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/ipredator-inc-cyberbullying-bullying-ipredator-image.png 509w, https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//2013/07/ipredator-inc-cyberbullying-bullying-ipredator-image-300x63.png 300w" sizes="(max-width: 509px) 100vw, 509px" /></p>
  427. <p style="text-align: center;"><a href="https://darkpsychology.co"><img class="aligncenter size-full wp-image-13996" src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//home-button-dark-psychology-darkside-of-human-consciousness-michael-nuccitelli-psy-d-ipredator.png" alt="home-button-dark psychology-darkside of human consciousness-michael nuccitelli, psy.d.-ipredator" width="122" height="45" /></a></p>
  428. <p style="text-align: center;">Author: Michael Nuccitelli, Psy.D.<br />
  429. <a href="https://plus.google.com/+MichaelNuccitelli">Google</a><br />
  430. Published by iPredator Inc.<br />
  431. <a href="https://plus.google.com/+IpredatorCoUSA/" rel="publisher">Find us on Google+</a><br />
  432. Publisher: iPredator<br />
  433. <a href="https://plus.google.com/+iPredatorCo/" rel="publisher">Find us on Google+</a><br />
  434. Publisher: Dark Psychology<br />
  435. <a href="https://plus.google.com/+DarkPsychologyCoSite/" rel="publisher">Find us on Google+</a></p>
  436. <div id="schema_block" class="schema_organization"><div itemscope itemtype="http://schema.org/Corporation"><a class="schema_url" target="_blank" itemprop="url" href="https://www.ipredator.co"><div class="schema_name" itemprop="name">iPredator Inc.</div></a><div class="schema_description" itemprop="description">iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products &amp; services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational &amp; awareness campaign with the help of private, state and federal agencies. </div><div itemprop="address" itemscope itemtype="http://schema.org/PostalAddress"><div class="city_state"><span class="locale" itemprop="addressLocality">New York</span>,<span class="region" itemprop="addressRegion"> New York</span></div><div class="country" itemprop="addressCountry">US</div></div><div class="email" itemprop="email">i&#110;&#102;&#111;&#64;&#105;&#112;&#114;ed&#97;tori&#110;c.&#99;om&#32;</div><div class="phone" itemprop="telephone">Phone: 347-871-2416</div></div></div>
  437.  
  438. <div class="wp_rp_wrap wp_rp_vertical_m" id="wp_rp_first"><div class="wp_rp_content"><h3 class="related_post_title">Related Posts</h3><ul class="related_post wp_rp"><li data-position="0" data-poid="in-3188" data-post-type="none" ><a href="https://darkpsychology.co/dark-psychology-cyberbullying/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//baby-boomer-internet-safety-webpage-available-at-ipredator-150x150.png" alt="Cyberbullying &#038; Dark Psychology" width="150" height="150" /></a><a href="https://darkpsychology.co/dark-psychology-cyberbullying/" class="wp_rp_title">Cyberbullying &#038; Dark Psychology</a></li><li data-position="1" data-poid="in-3171" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-academic-impact/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-academic-impact-michael-nuccitelli-psy-d-150x150.png" alt="Cyberbullying &#038; Academic Impact-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-academic-impact/" class="wp_rp_title">Cyberbullying &#038; Academic Impact-Michael Nuccitelli, Psy.D.</a></li><li data-position="2" data-poid="in-3149" data-post-type="none" ><a href="https://darkpsychology.co/signs-cyberbullying/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//new-ipredator-google-business-page-invitation-150x150.png" alt="The Signs of Cyberbullying-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/signs-cyberbullying/" class="wp_rp_title">The Signs of Cyberbullying-Michael Nuccitelli, Psy.D.</a></li><li data-position="3" data-poid="in-2314" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-bullying-ipredator/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cropped-dark-psychology-criminal-deviant-cybercriminal-minds-michael-nuccitelli-psy.d.-ipredator-blog-4-150x150.png" alt="Cyberbullying, Bullying &#038; iPredator Educational Media" width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-bullying-ipredator/" class="wp_rp_title">Cyberbullying, Bullying &#038; iPredator Educational Media</a></li><li data-position="4" data-poid="in-3244" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-ipredator/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-and-ipredator-michael-nuccitelli-psy-d-150x150.png" alt="Cyberbullying and iPredator-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-ipredator/" class="wp_rp_title">Cyberbullying and iPredator-Michael Nuccitelli, Psy.D.</a></li><li data-position="5" data-poid="in-3138" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-facts-issues/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyber-stalking-and-the-new-online-predators-150x150.png" alt="Cyberbullying Facts &#038; Issues-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-facts-issues/" class="wp_rp_title">Cyberbullying Facts &#038; Issues-Michael Nuccitelli, Psy.D.</a></li></ul></div></div>
  439. </div><span class="et_social_bottom_trigger"></span> </div> <!-- .entry-content -->
  440. <div class="et_post_meta_wrapper">
  441.  
  442.  
  443. </div> <!-- .et_post_meta_wrapper -->
  444. </article> <!-- .et_pb_post -->
  445.  
  446. </div> <!-- #left-area -->
  447.  
  448. <div id="sidebar">
  449. <div id="recent-posts-3" class="et_pb_widget widget_recent_entries"> <h4 class="widgettitle">RECENT POSTS</h4> <ul>
  450. <li>
  451. <a href="https://darkpsychology.co/michael-nuccitelli-todd-m-knisely-fake/">Michael Nuccitelli, Psy.D. &#8211; Predatory Troll or Fake News?</a>
  452. </li>
  453. <li>
  454. <a href="https://darkpsychology.co/michael-nuccitelli-dark-side-of-cyberspace/">Dark Side of Cyberspace Images-Michael Nuccitelli, Psy.D.</a>
  455. </li>
  456. <li>
  457. <a href="https://darkpsychology.co/quality-dental-care/">Michael Nuccitelli, Psy.D. Thanks Quality Dental Care, P.C.</a>
  458. </li>
  459. <li>
  460. <a href="https://darkpsychology.co/michael-nuccitelli-goliath-labs/">Michael Nuccitelli, Psy.D. Thanks Goliath Labs Donation</a>
  461. </li>
  462. <li>
  463. <a href="https://darkpsychology.co/michael-nuccitelli-psy-d-cu-boulder/">Michael Nuccitelli, Psy.D. Appreciates CU Boulder</a>
  464. </li>
  465. </ul>
  466. </div> <!-- end .et_pb_widget --><div id="monarchwidget-2" class="et_pb_widget widget_monarchwidget"><h4 class="widgettitle">FOLLOW IPREDATOR INC.</h4><div class="et_social_networks et_social_4col et_social_slide et_social_rectangle et_social_left et_social_mobile_on et_social_outer_dark widget_monarchwidget">
  467.  
  468.  
  469. <ul class="et_social_icons_container"><li class="et_social_googleplus">
  470. <a href="https://plus.google.com/+IpredatorCoUSA/" class="et_social_follow" data-social_name="googleplus" data-social_type="follow" data-post_id="3159" target="_blank">
  471. <i class="et_social_icon et_social_icon_googleplus"></i>
  472.  
  473. <span class="et_social_overlay"></span>
  474. </a>
  475. </li><li class="et_social_facebook">
  476. <a href="https://www.facebook.com/pages/The-iPredator/314877728534332" class="et_social_follow" data-social_name="facebook" data-social_type="follow" data-post_id="3159" target="_blank">
  477. <i class="et_social_icon et_social_icon_facebook"></i>
  478.  
  479. <span class="et_social_overlay"></span>
  480. </a>
  481. </li><li class="et_social_twitter">
  482. <a href="https://twitter.com/theipredator" class="et_social_follow" data-social_name="twitter" data-social_type="follow" data-post_id="3159" target="_blank">
  483. <i class="et_social_icon et_social_icon_twitter"></i>
  484.  
  485. <span class="et_social_overlay"></span>
  486. </a>
  487. </li><li class="et_social_pinterest">
  488. <a href="https://www.pinterest.com/ipredator/" class="et_social_follow" data-social_name="pinterest" data-social_type="follow" data-post_id="3159" target="_blank">
  489. <i class="et_social_icon et_social_icon_pinterest"></i>
  490.  
  491. <span class="et_social_overlay"></span>
  492. </a>
  493. </li><li class="et_social_linkedin">
  494. <a href="https://www.linkedin.com/in/ipredator" class="et_social_follow" data-social_name="linkedin" data-social_type="follow" data-post_id="3159" target="_blank">
  495. <i class="et_social_icon et_social_icon_linkedin"></i>
  496.  
  497. <span class="et_social_overlay"></span>
  498. </a>
  499. </li><li class="et_social_tumblr">
  500. <a href="http://ipredator.tumblr.com/" class="et_social_follow" data-social_name="tumblr" data-social_type="follow" data-post_id="3159" target="_blank">
  501. <i class="et_social_icon et_social_icon_tumblr"></i>
  502.  
  503. <span class="et_social_overlay"></span>
  504. </a>
  505. </li><li class="et_social_youtube">
  506. <a href="https://www.youtube.com/user/ipredatorteam" class="et_social_follow" data-social_name="youtube" data-social_type="follow" data-post_id="3159" target="_blank">
  507. <i class="et_social_icon et_social_icon_youtube"></i>
  508.  
  509. <span class="et_social_overlay"></span>
  510. </a>
  511. </li><li class="et_social_like">
  512. <a href="#" class="et_social_follow" data-social_name="like" data-social_type="like" data-post_id="3159" target="_blank">
  513. <i class="et_social_icon et_social_icon_like"></i>
  514.  
  515. <span class="et_social_overlay"></span>
  516. </a>
  517. </li></ul>
  518. </div></div> <!-- end .et_pb_widget --><div id="search-3" class="et_pb_widget widget_search"><h4 class="widgettitle">SEARCH</h4><form role="search" method="get" id="searchform" class="searchform" action="https://darkpsychology.co/">
  519. <div>
  520. <label class="screen-reader-text" for="s">Search for:</label>
  521. <input type="text" value="" name="s" id="s" />
  522. <input type="submit" id="searchsubmit" value="Search" />
  523. </div>
  524. </form></div> <!-- end .et_pb_widget --><div id="categories-3" class="et_pb_widget widget_categories"><h4 class="widgettitle">CATEGORIES</h4><form action="https://darkpsychology.co" method="get"><label class="screen-reader-text" for="cat">CATEGORIES</label><select name='cat' id='cat' class='postform' >
  525. <option value='-1'>Select Category</option>
  526. <option class="level-0" value="1014">Blog</option>
  527. <option class="level-0" value="160">Criminal Mind Posts</option>
  528. <option class="level-0" value="954">Cyberbullying Posts</option>
  529. <option class="level-0" value="956">Cybercrime Posts</option>
  530. <option class="level-0" value="153">Cybercriminal Mind Posts</option>
  531. <option class="level-0" value="955">Cyberstalking Posts</option>
  532. <option class="level-0" value="961">Educational Media</option>
  533. <option class="level-0" value="670">Featured</option>
  534. <option class="level-0" value="962">Internet Safety Posts</option>
  535. <option class="level-0" value="960">iPredator Inc. Posts</option>
  536. <option class="level-0" value="957">Online Predator Posts</option>
  537. <option class="level-0" value="958">Psychopathy Posts</option>
  538. <option class="level-0" value="224">Tool Posts</option>
  539. <option class="level-0" value="959">Troll Posts</option>
  540. </select>
  541. </form>
  542. <script type='text/javascript'>
  543. /* <![CDATA[ */
  544. (function() {
  545. var dropdown = document.getElementById( "cat" );
  546. function onCatChange() {
  547. if ( dropdown.options[ dropdown.selectedIndex ].value > 0 ) {
  548. dropdown.parentNode.submit();
  549. }
  550. }
  551. dropdown.onchange = onCatChange;
  552. })();
  553. /* ]]> */
  554. </script>
  555.  
  556. </div> <!-- end .et_pb_widget --><div id="wp_related_posts_widget" class="et_pb_widget widget_wp_related_posts">
  557. <div class="wp_rp_wrap wp_rp_vertical_m" ><div class="wp_rp_content"><h4 class="widgettitle">Related Posts</h4><ul class="related_post wp_rp"><li data-position="0" data-poid="in-3188" data-post-type="none" ><a href="https://darkpsychology.co/dark-psychology-cyberbullying/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//baby-boomer-internet-safety-webpage-available-at-ipredator-150x150.png" alt="Cyberbullying &#038; Dark Psychology" width="150" height="150" /></a><a href="https://darkpsychology.co/dark-psychology-cyberbullying/" class="wp_rp_title">Cyberbullying &#038; Dark Psychology</a></li><li data-position="1" data-poid="in-3171" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-academic-impact/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-academic-impact-michael-nuccitelli-psy-d-150x150.png" alt="Cyberbullying &#038; Academic Impact-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-academic-impact/" class="wp_rp_title">Cyberbullying &#038; Academic Impact-Michael Nuccitelli, Psy.D.</a></li><li data-position="2" data-poid="in-3149" data-post-type="none" ><a href="https://darkpsychology.co/signs-cyberbullying/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//new-ipredator-google-business-page-invitation-150x150.png" alt="The Signs of Cyberbullying-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/signs-cyberbullying/" class="wp_rp_title">The Signs of Cyberbullying-Michael Nuccitelli, Psy.D.</a></li><li data-position="3" data-poid="in-2314" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-bullying-ipredator/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cropped-dark-psychology-criminal-deviant-cybercriminal-minds-michael-nuccitelli-psy.d.-ipredator-blog-4-150x150.png" alt="Cyberbullying, Bullying &#038; iPredator Educational Media" width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-bullying-ipredator/" class="wp_rp_title">Cyberbullying, Bullying &#038; iPredator Educational Media</a></li><li data-position="4" data-poid="in-3244" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-ipredator/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyberbullying-and-ipredator-michael-nuccitelli-psy-d-150x150.png" alt="Cyberbullying and iPredator-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-ipredator/" class="wp_rp_title">Cyberbullying and iPredator-Michael Nuccitelli, Psy.D.</a></li><li data-position="5" data-poid="in-3138" data-post-type="none" ><a href="https://darkpsychology.co/cyberbullying-facts-issues/" class="wp_rp_thumbnail"><img src="https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/uploads//cyber-stalking-and-the-new-online-predators-150x150.png" alt="Cyberbullying Facts &#038; Issues-Michael Nuccitelli, Psy.D." width="150" height="150" /></a><a href="https://darkpsychology.co/cyberbullying-facts-issues/" class="wp_rp_title">Cyberbullying Facts &#038; Issues-Michael Nuccitelli, Psy.D.</a></li></ul></div></div>
  558. </div> <!-- end .et_pb_widget --><div id="pages-2" class="et_pb_widget widget_pages"><h4 class="widgettitle">PAGES</h4> <ul>
  559. <li class="page_item page-item-13148"><a href="https://darkpsychology.co/cyberbullying-facts/">42 Cyberbullying Facts</a></li>
  560. <li class="page_item page-item-4527"><a href="https://darkpsychology.co/five-dark-psychology-ipredator-definitions/">5 Dark Psychology &#038; iPredator Definitions</a></li>
  561. <li class="page_item page-item-3587"><a href="https://darkpsychology.co/about-us-ipredator/">About Us</a></li>
  562. <li class="page_item page-item-16031 current_page_parent"><a href="https://darkpsychology.co/blog/">Blog</a></li>
  563. <li class="page_item page-item-12817"><a href="https://darkpsychology.co/contact-us/">Contact Us</a></li>
  564. <li class="page_item page-item-5296"><a href="https://darkpsychology.co/internet-safety-tools-overview/">Cyber Attack Risk Assessments</a></li>
  565. <li class="page_item page-item-17030"><a href="https://darkpsychology.co/michael-nuccitelli-cyber-bullying/">Cyber Bullying-31 Free Images by Michael Nuccitelli, Psy.D.</a></li>
  566. <li class="page_item page-item-11884"><a href="https://darkpsychology.co/cyber-tyger-2015/">Cyber Tyger</a></li>
  567. <li class="page_item page-item-1049"><a href="https://darkpsychology.co/dark-psychology/">Dark Psychology Definition</a></li>
  568. <li class="page_item page-item-15801"><a href="https://darkpsychology.co/">Dark Psychology: Criminal, Deviant, Cybercriminal Minds</a></li>
  569. <li class="page_item page-item-16488"><a href="https://darkpsychology.co/donations/">DONATIONS</a></li>
  570. <li class="page_item page-item-11559"><a href="https://darkpsychology.co/cybercriminal-minds/">Inside Cybercriminal Minds</a></li>
  571. <li class="page_item page-item-8468"><a href="https://darkpsychology.co/lnm-radio-network-internet-radio-troll/">Internet Radio Trolls</a></li>
  572. <li class="page_item page-item-4029"><a href="https://darkpsychology.co/internet-trolls/">Internet Trolls</a></li>
  573. <li class="page_item page-item-16514"><a href="https://darkpsychology.co/lnm-radio-network-michael-vara-troll-triad/">LNM Radio Network, Michael Vara-Troll Triad</a></li>
  574. <li class="page_item page-item-9283"><a href="https://darkpsychology.co/lnm-radio-network-michael-vara-ipredator/">Media iPredators?</a></li>
  575. <li class="page_item page-item-4343"><a href="https://darkpsychology.co/online-deception/">Online Deception and Deceptive Online Practices-Q &#038; A</a></li>
  576. <li class="page_item page-item-8067"><a href="https://darkpsychology.co/online-psychopathy-checklist/">Online Psychopathy Checklist</a></li>
  577. <li class="page_item page-item-4451"><a href="https://darkpsychology.co/privacy-policy/">Privacy Policy</a></li>
  578. <li class="page_item page-item-4460"><a href="https://darkpsychology.co/terms-of-service/">Terms of Service</a></li>
  579. <li class="page_item page-item-9204"><a href="https://darkpsychology.co/troll/">Troll &#8211; 100 Plus Types and Examples of Internet Trolls</a></li>
  580. <li class="page_item page-item-11882"><a href="https://darkpsychology.co/troll-man-trollman/">Troll Man</a></li>
  581. <li class="page_item page-item-9136"><a href="https://darkpsychology.co/troll-man-cyber-tyger/">Troll Man vs. Cyber Tyger</a></li>
  582. <li class="page_item page-item-12441"><a href="https://darkpsychology.co/troll-triad">Troll Triad &#8211; An Internet Troll Group Dynamic Construct</a></li>
  583. <li class="page_item page-item-8556"><a href="https://darkpsychology.co/michael-nuccitelli-cyberbullying/">What is Cyberbullying</a></li>
  584. </ul>
  585. </div> <!-- end .et_pb_widget --><div id="archives-4" class="et_pb_widget widget_archive"><h4 class="widgettitle">ARCHIVES</h4> <ul>
  586. <li><a href='https://darkpsychology.co/2017/02/'>February 2017</a></li>
  587. <li><a href='https://darkpsychology.co/2016/04/'>April 2016</a></li>
  588. <li><a href='https://darkpsychology.co/2016/02/'>February 2016</a></li>
  589. <li><a href='https://darkpsychology.co/2016/01/'>January 2016</a></li>
  590. <li><a href='https://darkpsychology.co/2015/12/'>December 2015</a></li>
  591. <li><a href='https://darkpsychology.co/2015/10/'>October 2015</a></li>
  592. <li><a href='https://darkpsychology.co/2015/07/'>July 2015</a></li>
  593. <li><a href='https://darkpsychology.co/2015/06/'>June 2015</a></li>
  594. <li><a href='https://darkpsychology.co/2015/05/'>May 2015</a></li>
  595. <li><a href='https://darkpsychology.co/2015/04/'>April 2015</a></li>
  596. <li><a href='https://darkpsychology.co/2015/03/'>March 2015</a></li>
  597. <li><a href='https://darkpsychology.co/2015/01/'>January 2015</a></li>
  598. <li><a href='https://darkpsychology.co/2014/12/'>December 2014</a></li>
  599. <li><a href='https://darkpsychology.co/2014/11/'>November 2014</a></li>
  600. <li><a href='https://darkpsychology.co/2014/10/'>October 2014</a></li>
  601. <li><a href='https://darkpsychology.co/2014/09/'>September 2014</a></li>
  602. <li><a href='https://darkpsychology.co/2014/08/'>August 2014</a></li>
  603. <li><a href='https://darkpsychology.co/2014/05/'>May 2014</a></li>
  604. <li><a href='https://darkpsychology.co/2014/04/'>April 2014</a></li>
  605. <li><a href='https://darkpsychology.co/2014/03/'>March 2014</a></li>
  606. <li><a href='https://darkpsychology.co/2014/01/'>January 2014</a></li>
  607. <li><a href='https://darkpsychology.co/2013/12/'>December 2013</a></li>
  608. <li><a href='https://darkpsychology.co/2013/11/'>November 2013</a></li>
  609. <li><a href='https://darkpsychology.co/2013/09/'>September 2013</a></li>
  610. <li><a href='https://darkpsychology.co/2013/08/'>August 2013</a></li>
  611. <li><a href='https://darkpsychology.co/2013/07/'>July 2013</a></li>
  612. <li><a href='https://darkpsychology.co/2013/06/'>June 2013</a></li>
  613. <li><a href='https://darkpsychology.co/2013/05/'>May 2013</a></li>
  614. <li><a href='https://darkpsychology.co/2013/02/'>February 2013</a></li>
  615. <li><a href='https://darkpsychology.co/2013/01/'>January 2013</a></li>
  616. <li><a href='https://darkpsychology.co/2012/12/'>December 2012</a></li>
  617. <li><a href='https://darkpsychology.co/2012/11/'>November 2012</a></li>
  618. <li><a href='https://darkpsychology.co/2012/07/'>July 2012</a></li>
  619. <li><a href='https://darkpsychology.co/2012/05/'>May 2012</a></li>
  620. <li><a href='https://darkpsychology.co/2012/01/'>January 2012</a></li>
  621. <li><a href='https://darkpsychology.co/2011/11/'>November 2011</a></li>
  622. <li><a href='https://darkpsychology.co/2011/10/'>October 2011</a></li>
  623. <li><a href='https://darkpsychology.co/2011/09/'>September 2011</a></li>
  624. <li><a href='https://darkpsychology.co/2011/08/'>August 2011</a></li>
  625. <li><a href='https://darkpsychology.co/2011/07/'>July 2011</a></li>
  626. <li><a href='https://darkpsychology.co/2011/06/'>June 2011</a></li>
  627. <li><a href='https://darkpsychology.co/2011/05/'>May 2011</a></li>
  628. <li><a href='https://darkpsychology.co/2011/03/'>March 2011</a></li>
  629. <li><a href='https://darkpsychology.co/2011/02/'>February 2011</a></li>
  630. </ul>
  631. </div> <!-- end .et_pb_widget --><div id="text-8" class="et_pb_widget widget_text"> <div class="textwidget"><span id="siteseal"><script async type="text/javascript" src="https://seal.starfieldtech.com/getSeal?sealID=4Lw8qT6N2fvX6zwUtjfzRRAy8yc9xscLq32Bt6W2zKhrwMqJ0V6NyrnqW19D"></script></span></div>
  632. </div> <!-- end .et_pb_widget --> </div> <!-- end #sidebar -->
  633. </div> <!-- #content-area -->
  634. </div> <!-- .container -->
  635. </div> <!-- #main-content -->
  636.  
  637.  
  638. <span class="et_pb_scroll_top et-pb-icon"></span>
  639.  
  640.  
  641. <footer id="main-footer">
  642.  
  643. <div class="container">
  644. <div id="footer-widgets" class="clearfix">
  645. <div class="footer-widget"><div id="categories-4" class="fwidget et_pb_widget widget_categories"><h4 class="title">CATEGORIES</h4><form action="https://darkpsychology.co" method="get"><label class="screen-reader-text" for="categories-dropdown-4">CATEGORIES</label><select name='cat' id='categories-dropdown-4' class='postform' >
  646. <option value='-1'>Select Category</option>
  647. <option class="level-0" value="1014">Blog</option>
  648. <option class="level-0" value="160">Criminal Mind Posts</option>
  649. <option class="level-0" value="954">Cyberbullying Posts</option>
  650. <option class="level-0" value="956">Cybercrime Posts</option>
  651. <option class="level-0" value="153">Cybercriminal Mind Posts</option>
  652. <option class="level-0" value="955">Cyberstalking Posts</option>
  653. <option class="level-0" value="961">Educational Media</option>
  654. <option class="level-0" value="670">Featured</option>
  655. <option class="level-0" value="962">Internet Safety Posts</option>
  656. <option class="level-0" value="960">iPredator Inc. Posts</option>
  657. <option class="level-0" value="957">Online Predator Posts</option>
  658. <option class="level-0" value="958">Psychopathy Posts</option>
  659. <option class="level-0" value="224">Tool Posts</option>
  660. <option class="level-0" value="959">Troll Posts</option>
  661. </select>
  662. </form>
  663. <script type='text/javascript'>
  664. /* <![CDATA[ */
  665. (function() {
  666. var dropdown = document.getElementById( "categories-dropdown-4" );
  667. function onCatChange() {
  668. if ( dropdown.options[ dropdown.selectedIndex ].value > 0 ) {
  669. dropdown.parentNode.submit();
  670. }
  671. }
  672. dropdown.onchange = onCatChange;
  673. })();
  674. /* ]]> */
  675. </script>
  676.  
  677. </div> <!-- end .fwidget --><div id="search-6" class="fwidget et_pb_widget widget_search"><h4 class="title">SEARCH</h4><form role="search" method="get" id="searchform" class="searchform" action="https://darkpsychology.co/">
  678. <div>
  679. <label class="screen-reader-text" for="s">Search for:</label>
  680. <input type="text" value="" name="s" id="s" />
  681. <input type="submit" id="searchsubmit" value="Search" />
  682. </div>
  683. </form></div> <!-- end .fwidget --><div id="text-7" class="fwidget et_pb_widget widget_text"> <div class="textwidget"><span id="siteseal"><script async type="text/javascript" src="https://seal.starfieldtech.com/getSeal?sealID=4Lw8qT6N2fvX6zwUtjfzRRAy8yc9xscLq32Bt6W2zKhrwMqJ0V6NyrnqW19D"></script></span></div>
  684. </div> <!-- end .fwidget --></div> <!-- end .footer-widget --><div class="footer-widget"> <div id="recent-posts-4" class="fwidget et_pb_widget widget_recent_entries"> <h4 class="title">RECENT POSTS</h4> <ul>
  685. <li>
  686. <a href="https://darkpsychology.co/michael-nuccitelli-todd-m-knisely-fake/">Michael Nuccitelli, Psy.D. &#8211; Predatory Troll or Fake News?</a>
  687. </li>
  688. <li>
  689. <a href="https://darkpsychology.co/michael-nuccitelli-dark-side-of-cyberspace/">Dark Side of Cyberspace Images-Michael Nuccitelli, Psy.D.</a>
  690. </li>
  691. <li>
  692. <a href="https://darkpsychology.co/quality-dental-care/">Michael Nuccitelli, Psy.D. Thanks Quality Dental Care, P.C.</a>
  693. </li>
  694. <li>
  695. <a href="https://darkpsychology.co/michael-nuccitelli-goliath-labs/">Michael Nuccitelli, Psy.D. Thanks Goliath Labs Donation</a>
  696. </li>
  697. <li>
  698. <a href="https://darkpsychology.co/michael-nuccitelli-psy-d-cu-boulder/">Michael Nuccitelli, Psy.D. Appreciates CU Boulder</a>
  699. </li>
  700. </ul>
  701. </div> <!-- end .fwidget --></div> <!-- end .footer-widget --><div class="footer-widget"><div id="calendar-3" class="fwidget et_pb_widget widget_calendar"><h4 class="title">Calendar</h4><div id="calendar_wrap" class="calendar_wrap"><table id="wp-calendar">
  702. <caption>January 2018</caption>
  703. <thead>
  704. <tr>
  705. <th scope="col" title="Monday">M</th>
  706. <th scope="col" title="Tuesday">T</th>
  707. <th scope="col" title="Wednesday">W</th>
  708. <th scope="col" title="Thursday">T</th>
  709. <th scope="col" title="Friday">F</th>
  710. <th scope="col" title="Saturday">S</th>
  711. <th scope="col" title="Sunday">S</th>
  712. </tr>
  713. </thead>
  714.  
  715. <tfoot>
  716. <tr>
  717. <td colspan="3" id="prev"><a href="https://darkpsychology.co/2017/02/">&laquo; Feb</a></td>
  718. <td class="pad">&nbsp;</td>
  719. <td colspan="3" id="next" class="pad">&nbsp;</td>
  720. </tr>
  721. </tfoot>
  722.  
  723. <tbody>
  724. <tr><td>1</td><td>2</td><td>3</td><td>4</td><td>5</td><td>6</td><td>7</td>
  725. </tr>
  726. <tr>
  727. <td>8</td><td>9</td><td>10</td><td>11</td><td>12</td><td>13</td><td>14</td>
  728. </tr>
  729. <tr>
  730. <td>15</td><td>16</td><td>17</td><td>18</td><td>19</td><td>20</td><td>21</td>
  731. </tr>
  732. <tr>
  733. <td id="today">22</td><td>23</td><td>24</td><td>25</td><td>26</td><td>27</td><td>28</td>
  734. </tr>
  735. <tr>
  736. <td>29</td><td>30</td><td>31</td>
  737. <td class="pad" colspan="4">&nbsp;</td>
  738. </tr>
  739. </tbody>
  740. </table></div></div> <!-- end .fwidget --><div id="text-6" class="fwidget et_pb_widget widget_text"> <div class="textwidget"><p>Copyright © 2018 | iPredator Inc.</p>
  741. </div>
  742. </div> <!-- end .fwidget --></div> <!-- end .footer-widget --><div class="footer-widget last"><div id="aboutmewidget-2" class="fwidget et_pb_widget widget_aboutmewidget"><h4 class="title">IPREDATOR INC.</h4> <div class="clearfix">
  743. <img src="" id="about-image" alt="" />
  744. iPredator Inc. is a New York State based Cybercriminal Psychology and Internet Safety Company providing education, investigation and consultation to online users and organizations.
  745. </div> <!-- end about me section -->
  746. </div> <!-- end .fwidget --><div id="monarchwidget-3" class="fwidget et_pb_widget widget_monarchwidget"><h4 class="title">Follow Us</h4><div class="et_social_networks et_social_4col et_social_slide et_social_rectangle et_social_left et_social_mobile_on et_social_outer_dark widget_monarchwidget">
  747.  
  748.  
  749. <ul class="et_social_icons_container"><li class="et_social_googleplus">
  750. <a href="https://plus.google.com/+IpredatorCoUSA/" class="et_social_follow" data-social_name="googleplus" data-social_type="follow" data-post_id="3159" target="_blank">
  751. <i class="et_social_icon et_social_icon_googleplus"></i>
  752.  
  753. <span class="et_social_overlay"></span>
  754. </a>
  755. </li><li class="et_social_facebook">
  756. <a href="https://www.facebook.com/pages/The-iPredator/314877728534332" class="et_social_follow" data-social_name="facebook" data-social_type="follow" data-post_id="3159" target="_blank">
  757. <i class="et_social_icon et_social_icon_facebook"></i>
  758.  
  759. <span class="et_social_overlay"></span>
  760. </a>
  761. </li><li class="et_social_twitter">
  762. <a href="https://twitter.com/theipredator" class="et_social_follow" data-social_name="twitter" data-social_type="follow" data-post_id="3159" target="_blank">
  763. <i class="et_social_icon et_social_icon_twitter"></i>
  764.  
  765. <span class="et_social_overlay"></span>
  766. </a>
  767. </li><li class="et_social_pinterest">
  768. <a href="https://www.pinterest.com/ipredator/" class="et_social_follow" data-social_name="pinterest" data-social_type="follow" data-post_id="3159" target="_blank">
  769. <i class="et_social_icon et_social_icon_pinterest"></i>
  770.  
  771. <span class="et_social_overlay"></span>
  772. </a>
  773. </li><li class="et_social_linkedin">
  774. <a href="https://www.linkedin.com/in/ipredator" class="et_social_follow" data-social_name="linkedin" data-social_type="follow" data-post_id="3159" target="_blank">
  775. <i class="et_social_icon et_social_icon_linkedin"></i>
  776.  
  777. <span class="et_social_overlay"></span>
  778. </a>
  779. </li><li class="et_social_tumblr">
  780. <a href="http://ipredator.tumblr.com/" class="et_social_follow" data-social_name="tumblr" data-social_type="follow" data-post_id="3159" target="_blank">
  781. <i class="et_social_icon et_social_icon_tumblr"></i>
  782.  
  783. <span class="et_social_overlay"></span>
  784. </a>
  785. </li><li class="et_social_youtube">
  786. <a href="https://www.youtube.com/user/ipredatorteam" class="et_social_follow" data-social_name="youtube" data-social_type="follow" data-post_id="3159" target="_blank">
  787. <i class="et_social_icon et_social_icon_youtube"></i>
  788.  
  789. <span class="et_social_overlay"></span>
  790. </a>
  791. </li><li class="et_social_like">
  792. <a href="#" class="et_social_follow" data-social_name="like" data-social_type="like" data-post_id="3159" target="_blank">
  793. <i class="et_social_icon et_social_icon_like"></i>
  794.  
  795. <span class="et_social_overlay"></span>
  796. </a>
  797. </li></ul>
  798. </div></div> <!-- end .fwidget --></div> <!-- end .footer-widget --> </div> <!-- #footer-widgets -->
  799. </div> <!-- .container -->
  800.  
  801.  
  802. <div id="footer-bottom">
  803. <div class="container clearfix">
  804. <ul class="et-social-icons">
  805.  
  806. <li class="et-social-icon et-social-facebook">
  807. <a href="https://www.facebook.com/pages/The-iPredator/314877728534332" class="icon">
  808. <span>Facebook</span>
  809. </a>
  810. </li>
  811. <li class="et-social-icon et-social-twitter">
  812. <a href="https://twitter.com/theipredator" class="icon">
  813. <span>Twitter</span>
  814. </a>
  815. </li>
  816. <li class="et-social-icon et-social-google-plus">
  817. <a href="https://plus.google.com/+DarkPsychologyCoSite/" class="icon">
  818. <span>Google</span>
  819. </a>
  820. </li>
  821.  
  822. </ul><p id="footer-info">Designed by <a href="http://www.elegantthemes.com" title="Premium WordPress Themes">Elegant Themes</a> | Powered by <a href="http://www.wordpress.org">WordPress</a></p> </div> <!-- .container -->
  823. </div>
  824. </footer> <!-- #main-footer -->
  825. </div> <!-- #et-main-area -->
  826.  
  827.  
  828. </div> <!-- #page-container -->
  829.  
  830. <div class="et_social_pin_images_outer">
  831. <div class="et_social_pinterest_window">
  832. <div class="et_social_modal_header"><h3>Pin It on Pinterest</h3><span class="et_social_close"></span></div>
  833. <div class="et_social_pin_images" data-permalink="https://darkpsychology.co/cyberbullying-by-proxy/" data-title="Cyberbullying by Proxy-Michael Nuccitelli, Psy.D." data-post_id="3159"></div>
  834. </div>
  835. </div><div class="et_social_sidebar_networks et_social_visible_sidebar et_social_slideright et_social_animated et_social_circle et_social_sidebar_grow et_social_mobile_on">
  836.  
  837. <ul class="et_social_icons_container"><li class="et_social_googleplus">
  838. <a href="https://plus.google.com/share?url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;t=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D." class="et_social_share" rel="nofollow" data-social_name="googleplus" data-post_id="3159" data-social_type="share" data-location="sidebar">
  839. <i class="et_social_icon et_social_icon_googleplus"></i>
  840.  
  841.  
  842. <span class="et_social_overlay"></span>
  843. </a>
  844. </li><li class="et_social_twitter">
  845. <a href="http://twitter.com/share?text=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D.&#038;url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;via=TheiPredator" class="et_social_share" rel="nofollow" data-social_name="twitter" data-post_id="3159" data-social_type="share" data-location="sidebar">
  846. <i class="et_social_icon et_social_icon_twitter"></i>
  847.  
  848.  
  849. <span class="et_social_overlay"></span>
  850. </a>
  851. </li><li class="et_social_facebook">
  852. <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;t=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D." class="et_social_share" rel="nofollow" data-social_name="facebook" data-post_id="3159" data-social_type="share" data-location="sidebar">
  853. <i class="et_social_icon et_social_icon_facebook"></i>
  854.  
  855.  
  856. <span class="et_social_overlay"></span>
  857. </a>
  858. </li><li class="et_social_printfriendly">
  859. <a href="http://www.printfriendly.com/print?url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;title=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D." class="et_social_share" rel="nofollow" data-social_name="printfriendly" data-post_id="3159" data-social_type="share" data-location="sidebar">
  860. <i class="et_social_icon et_social_icon_printfriendly"></i>
  861.  
  862.  
  863. <span class="et_social_overlay"></span>
  864. </a>
  865. </li><li class="et_social_all_button">
  866. <a href="#" rel="nofollow" data-location="sidebar" data-page_id="3159" data-permalink="https://darkpsychology.co/cyberbullying-by-proxy/" data-title="Cyberbullying by Proxy-Michael Nuccitelli, Psy.D." class="et_social_open_all">
  867. <i class="et_social_icon et_social_icon_all_button"></i>
  868. <span class="et_social_overlay"></span>
  869. </a>
  870. </li></ul>
  871. <span class="et_social_hide_sidebar et_social_icon"></span>
  872. </div><div class="et_social_mobile_button"></div>
  873. <div class="et_social_mobile et_social_fadein">
  874. <div class="et_social_heading">Share This</div>
  875. <span class="et_social_close"></span>
  876. <div class="et_social_networks et_social_simple et_social_rounded et_social_left">
  877. <ul class="et_social_icons_container"><li class="et_social_googleplus">
  878. <a href="https://plus.google.com/share?url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;t=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D." class="et_social_share" rel="nofollow" data-social_name="googleplus" data-post_id="3159" data-social_type="share" data-location="sidebar">
  879. <i class="et_social_icon et_social_icon_googleplus"></i>
  880. <div class="et_social_network_label"><div class="et_social_networkname">Google+</div></div>
  881.  
  882. <span class="et_social_overlay"></span>
  883. </a>
  884. </li><li class="et_social_twitter">
  885. <a href="http://twitter.com/share?text=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D.&#038;url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;via=TheiPredator" class="et_social_share" rel="nofollow" data-social_name="twitter" data-post_id="3159" data-social_type="share" data-location="sidebar">
  886. <i class="et_social_icon et_social_icon_twitter"></i>
  887. <div class="et_social_network_label"><div class="et_social_networkname">Twitter</div></div>
  888.  
  889. <span class="et_social_overlay"></span>
  890. </a>
  891. </li><li class="et_social_facebook">
  892. <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;t=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D." class="et_social_share" rel="nofollow" data-social_name="facebook" data-post_id="3159" data-social_type="share" data-location="sidebar">
  893. <i class="et_social_icon et_social_icon_facebook"></i>
  894. <div class="et_social_network_label"><div class="et_social_networkname">Facebook</div></div>
  895.  
  896. <span class="et_social_overlay"></span>
  897. </a>
  898. </li><li class="et_social_printfriendly">
  899. <a href="http://www.printfriendly.com/print?url=https%3A%2F%2Fdarkpsychology.co%2Fcyberbullying-by-proxy%2F&#038;title=Cyberbullying%20by%20Proxy-Michael%20Nuccitelli%2C%20Psy.D." class="et_social_share" rel="nofollow" data-social_name="printfriendly" data-post_id="3159" data-social_type="share" data-location="sidebar">
  900. <i class="et_social_icon et_social_icon_printfriendly"></i>
  901. <div class="et_social_network_label"><div class="et_social_networkname">Print Friendly</div></div>
  902.  
  903. <span class="et_social_overlay"></span>
  904. </a>
  905. </li><li class="et_social_all_button">
  906. <a href="#" rel="nofollow" data-location="sidebar" data-page_id="3159" data-permalink="https://darkpsychology.co/cyberbullying-by-proxy/" data-title="Cyberbullying by Proxy-Michael Nuccitelli, Psy.D." class="et_social_open_all">
  907. <i class="et_social_icon et_social_icon_all_button"></i>
  908. <span class="et_social_overlay"></span>
  909. </a>
  910. </li></ul>
  911. </div>
  912. </div>
  913. <div class="et_social_mobile_overlay"></div> <script type="text/javascript">
  914. var et_animation_data = [];
  915. </script>
  916. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/plugins/monarch/js/idle-timer.min.js?ver=1515081726'></script>
  917. <script type='text/javascript'>
  918. /* <![CDATA[ */
  919. var monarchSettings = {"ajaxurl":"https:\/\/darkpsychology.co\/wp-admin\/admin-ajax.php","pageurl":"https:\/\/darkpsychology.co\/cyberbullying-by-proxy\/","stats_nonce":"efb7f6eeeb","share_counts":"df17ecf28d","follow_counts":"a433d1b40b","total_counts":"d3b2898eb6","media_single":"63a15c0445","media_total":"3b77a05f3a","generate_all_window_nonce":"b96ad05a49","no_img_message":"No images available for sharing on this page"};
  920. /* ]]> */
  921. </script>
  922. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/plugins/monarch/js/custom.js?ver=1515081726'></script>
  923. <script type='text/javascript'>
  924. /* <![CDATA[ */
  925. var et_shortcodes_strings = {"previous":"Previous","next":"Next"};
  926. var et_pb_custom = {"ajaxurl":"https:\/\/darkpsychology.co\/wp-admin\/admin-ajax.php","images_uri":"https:\/\/darkpsychology.co\/wp-content\/themes\/Divi\/images","builder_images_uri":"https:\/\/darkpsychology.co\/wp-content\/themes\/Divi\/includes\/builder\/images","et_frontend_nonce":"04bd020784","subscription_failed":"Please, check the fields below to make sure you entered the correct information.","et_ab_log_nonce":"f651b308c9","fill_message":"Please, fill in the following fields:","contact_error_message":"Please, fix the following errors:","invalid":"Invalid email","captcha":"Captcha","prev":"Prev","previous":"Previous","next":"Next","wrong_captcha":"You entered the wrong number in captcha.","is_builder_plugin_used":"","ignore_waypoints":"no","is_divi_theme_used":"1","widget_search_selector":".widget_search","is_ab_testing_active":"","page_id":"3159","unique_test_id":"","ab_bounce_rate":"5","is_cache_plugin_active":"no","is_shortcode_tracking":""};
  927. var et_pb_box_shadow_elements = [];
  928. /* ]]> */
  929. </script>
  930. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/themes/Divi/js/custom.min.js?ver=1516120744'></script>
  931. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-content/themes/Divi/core/admin/js/common.js?ver=1516120742'></script>
  932. <script type='text/javascript' src='https://darkpsychology-educationviewsor.netdna-ssl.com/wp-includes/js/wp-embed.min.js?ver=1481141328'></script>
  933. </body>
  934. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement