Brook Preloader



Children of the 21st century are targeted via classic bullying, cyberbullying or a combination of both. At the core is disparagement and abuse of a targeted child. Ill-treatment of children, whether perpetrated by a child or adult is detrimental to all aspects of pediatric development, following them into adulthood and throughout their lifespan. Supplied here is a quick list of methods a cyberbully uses to taunt their peers.

  1. Bash Boards: Disinformation a cyberbully posts in chat rooms, online forums and message boards.
  2. BlogoBullying: A cyberbully creates a blog and then makes their target the central character and topic of defamatory blog posts.
  3. Cyberbullying by Proxy: Using deception, encouragement or manipulation; a cyberbully persuades other online users to harass a target.
  4. Cyberstalking: When a cyberbully uses intimidation and persistent taunting that implies a direct or indirect threat to the target’s physical safety.
  5. Cyber Drama: When a cyberbully uses passive-aggressive & melodramatic content to defame their target.
  6. Cyber Harassment: When a cyberbully habitually sends defamatory messages to their target that is worded in a severe, persistent or pervasive manner.
  7. Cyber Threats: When a cyberbully falsely implies their target is in danger from unknown or felonious assailants, which causes the target distress.
  8. Denigration: When a cyberbully sends or publishes cruel rumors, gossip and false assertions about a target; trying to damage their reputation or friendships.
  9. Digital Piracy Inclusion: When a cyberbully persuades their target to engage in illegal digital piracy and then reports them to the authorities, their parents or educators.
  10. eIntimidation: A colloquial expression that describes when a cyberbully attempts to frighten their target using emails to threaten them.
  11. Exclusion: When a cyberbully sends a message to their target informing them that they are not invited to a social activity that other peers will be attending.
  12. Exposure: Using online forums, a cyberbully posts private communications, images or video about their target that is private and embarrassing.
  13. Flaming: Using online forums, a cyberbully provokes an argument with their target that includes profane or vulgar terminology.
  14. Griefing: When a cyberbully frequents online gaming environments; they frustrate their target by intentionally not following the rules.
  15. Happy Slapping: While the target is physically attacked and simultaneously recorded; the images or video is posted online by the cyberbully.
  16. Non-Consensual Multimedia Bullying: The target child does not know that embarrassing content is being disseminated by the cyberbully online.
  17. Impersonation: A cyberbully impersonates their target and posts defamatory comments on social networking sites, forums, message tables and in chat rooms.
  18. Instant Messaging (IM) Attacks: Using an instant messaging account, the cyberbully sends harassing and threatening messages to their target.
  19. Interactive Gaming Harassment: Having the ability to exchange information with online gaming opponents; cyberbullies verbally abuse their targets and lock them out of games.
  20. Malicious Code Dissemination: When a cyberbully sends malicious information, such as viruses, spyware and hacking programs to a target child.
  21. Micro-Visual Bullying: When a cyberbully disseminates 15-second videos to character assassinate a target child.
  22. Mobile Device Image Sharing: A type of cyberbullying & information exchange that can be criminal if the images are graphic depicting under aged children.
  23. Password Theft & Lockout: After a cyberbully steals their target’s password and begins to impersonate them online, the cyberbully locks them out from their accounts by changing the passwords.
  24. Phishing: A cyberbully manipulates their target into revealing financial information and then purchases unauthorized items with the target child’s or parents’ credit cards.
  25. Porn & Marketing List Insertion: Using confidential online sign-up forms, the cyberbully signs their target up to multiple porn or junk lists.
  26. Pseudonym Stealth: Cyberbullies secretly change their online usernames and begin to taunt, tease and humiliate the target preventing them from being named.
  27. Screen Name Mirroring: The cyberbully uses screen names almost identical to the target child’s requiring the respondent of the information to be attentive in differentiating the minor differences.
  28. Sexting: The cyberbully disseminates sexually themed information about the target child that is both highly embarrassing and humiliating.
  29. Sextortion: Using threats of disclosing humiliating information about their target, the cyberbully negotiates sex in exchange for not revealing embarrassing information.
  30. Slut Shaming: The cyberbully records images or videos of their target that is sexually provocative and then publishes this information throughout their school and online.
  31. Social Media Bullying: When the cyberbully persuades their target to include them in their “friends” or “buddy” lists and then contacts them with disparaging information about their target.
  32. Text Wars and Text Attacks: Using SMS, the cyberbully and a group of accomplices send hundreds of defamatory emails or text messages to a target child.
  33. Tragedy News Mirroring: The cyberbully announces that their target is planning to engage in a violent activity soon after a similar regional or national tragedy.
  34. Trickery: The target child is led to believe the sensitive information they consensually give the cyberbully will present them in a positive light after being published.
  35. Trolling: A method of harassment whereby the cyberbully taunts their target across multiple online environments ranging from online video gaming gatherings to chat rooms.
  36. Twitter Pooping: Insulting and provocative Tweets are disseminated that use “net lingo” to fit the harmful message the cyberbully is attempting to convey.
  37. Voting & Polling Booth Bullying: When a cyberbully creates web pages that allow others to vote for categories deemed highly embarrassing to their target.
  38. Warning Wars: When a cyberbully makes frequent false allegations to an ISP seeking their target’s profile or account be suspended.
  39. Web Page Assassination: A tactic whereby the cyberbully designs, and then posts web pages specifically intended to insult the target child, their peers or groups.
  40. VLE Bullying: In Virtual Learning Environments (VLE), cyberbullies use VLE message boards, chat rooms and instant messaging functions to ridicule a target child.
  41. Virtual World Bullying: Using their avatar in 3D online websites and virtual worlds, the cyberbully taunts and teases their target by using their avatar as the assailant or provocateur.
  42. YouTube Channeling: When the target minor becomes the central character in a YouTube Channel, they are taunted by both the content of the videos posted and the number of views online users have seen.

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, Cyberpsychology researcher and internet safety educator. He completed his doctoral degree in clinical psychology in 1994 from Adler University. In 2009, Dr. Nuccitelli finalized his online aggressor & Cyberpsychology concept called iPredator. Since 2010, he has supplied educational and advisory services to the private & public sectors about internet predators, cyberbullying, cyberstalking, cybercrime, internet trolls and online safety.

In June 2013, Dr. Nuccitelli launched his website iPredator offering site visitors an incredible amount of free informational content. He also has volunteered to serve a multitude of online users who have been cyber-attacked, defamed and cyberstalked. Dr. Nuccitelli’s areas of expertise include forensic psychology, cybercriminal psychology, mental health, internet addiction and developmental psychology. Dr. Nuccitelli continues to investigate and expand his iPredator & Dark Psychology concepts.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar