Contact Information:
Email: mbouchard@sfu.ca
Phone: +1 (778) 782-8135
Additional Information:
Website
Twitter
Google Scholar Citation Page
ResearchGate Page
Relevant Publications:
Bouchard, M., Davies, G., Frank, R., Wu, E., & Joffres, K. (Forthcoming). The Social Structure of Extremist Websites. In J. Littlewood, L. Dawson, & S. Thompson (Eds.), Canada Among Nations: Terrorism and Counterterrorism. University of Toronto Press.
Levey, P., & Bouchard, M. (2019). The Emergence of Violent Narratives in the Life-Course Trajectories of Online Forum Participants. Journal of Qualitative Criminal Justice and Criminology.
Westlake, B., Bouchard, M., & Girodat, A. (2016). How Obvious Is It? The Content of Child Sexual Exploitation Websites. Deviant Behavior, DOI: 10.1080/01639625.2016.1197001
Bouchard, M., & Westlake, B. (2016). La détection de communautés au sein de réseaux criminels en ligne et ses implications pour les recherches en co-délinquance. In Rémi Boivin and Carlo Morselli (Eds.), Les réseaux criminels. Les Presses de l’Université de Montréal.
Davies, G., Neudecker, C., Ouellet, M., Bouchard, M., & Ducol, B. (2016). Toward a Framework to Assess Online Programs for Countering Violent Extremism. Journal for Deradicalization, 6, 51-86.
Ducol, B., Bouchard, M., Davies, G., Ouellet, M., & Neudecker, C. (2016). Assessment of the State of Knowledge: Connections between Research on the Social Psychology of the Internet and Violent Extremism. Canadian Network for Research on Terrorism, Security and Society: No.16-05.
Westlake, B., & Bouchard, M. (2016). Liking and Hyperlinking: Community Detection in Online Child Exploitation Networks. Social Science Research, 59, 23-36.
Westlake, B., Bouchard, M., & Frank, R. (2015). Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation. Sexual Abuse: A Journal of Research and Treatment, DOI: 10.1177/1079063215616818
Westlake, B., & Bouchard, M. (2015). Criminal Careers in Cyberspace: Examining Website Failure within Child Exploitation Networks. Justice Quarterly, 33(7), 1154-1181
Allsup, R., Thomas, E., Monk, B., Frank, R., & Bouchard, M. (2015). Networking in Child Exploitation – Assessing Disruption Strategies Using Registrant Information. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
Bouchard, M., & Thomas, E. (2015). Radical and Connected: Concluding Thoughts and Future Research. In M. Bouchard (Ed.). Social Network, Terrorism and Counter-Terrorism: Radical and Connected. Routledge.
Bouchard, M., & Levey, P. (2015). Radical and Connected: An Introduction. In M. Bouchard (Ed.). Social Network, Terrorism and Counter-Terrorism: Radical and Connected. Routledge.
Davies, G., Bouchard, M., Wu, E., Joffres, K., & Frank, R. (2015). Terrorist and Extremist Organizations’ use of the Internet for Recruitment. In M. Bouchard (Ed.) Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected (pp. 105-127). Routledge.
Bouchard, M., & Nash, R. (2015). Researching Terrorism and Counter-Terrorism through a Network Lens. In M. Bouchard (Ed.) Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected (pp. 48-60). Routledge.
Frank, R., Bouchard, M., Davies, G., & Mei, J. (2015). Spreading the Message Digitally: A Look into Extremist Organizations’ use of the Internet. In R. G. Smith, R.C.-C. Cheung and L.Y.-C. Lau (Eds.) Cybercrime Risks and Responses: Eastern and Western Perspectives. Palgrave.
Joffres, K., & Bouchard, M. (2015). Vulnerabilities in Online Child Pornography Networks. In A. Malm and G. Bichler (Eds.), Disrupting Criminal Networks: Network Analysis in Crime Prevention (pp. 153-176). Crime Prevention Studies, Monsey, NY: Criminal Justice Press.
Bouchard, M. (2014). Outils et méthodes pour la construction et l’analyse des réseaux illicites sur Internet. Revue Internationale de Criminologie et de Police Technique et Scientifique, 67, 317-337.
Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor. In V. Mago and V. Dabbaghian (Eds.), Computational Models of Complex Systems (pp. 171-184). Springer.
Bouchard, M. (2013). Merging Computing and Crime Science: The Development of a Web-Crawling Tool to Investigate Cybercrime. Translational Criminology, 5, 15-17.
Westlake, B., Bouchard, M., & Frank, R. (2012). Comparing Methods for Detecting Child Exploitation Content Online. In Proceedings of the 2012 European Intelligence and Security Informatics Conference (EISIC).
Basamanowicz, J., & Bouchard, M. (2011). Overcoming the Warez Paradox: Situational Crime Prevention and Warez Scene Piracy. Policy & Internet, 3, 1-25.
Joffres, K., Bouchard, M., Frank, R., & Westlake, B. (2011). Strategies to Disrupt Online Child Exploitation Networks. In Proceedings of the 2011 European Intelligence and Security Informatics Conference (EISIC).
*Won the Honorable Mention Award for Best Paper at the 2011 EISIC conference
Westlake, B., Bouchard, M., & Frank, R. (2011). Finding the Key Players in Online Child Exploitation Networks. Policy & Internet, 3, 1-32.
Frank, R., Westlake, B., & Bouchard, M. (2010). The Structure and Content of Online Child Exploitation Networks. In Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (KDD).