Bouchard Martin
Bouchard-- Martin
“Networking in Child Exploitation – Assessing disruption strategies using registrant information
Liking and hyperlinking: Community detection in online child exploitation networks
An experimental test of deviant modeling
Toward a Framework Understanding of Online Programs for Countering Violent Extremism
Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …
Lessons from conducting trans-national Internet-mediated participatory research with hidden populations of cannabis cultivators
Abstract Background: Internet-mediated research methods are increasingly used to access hidden populations. The International Cannabis Cultivation Questionnaire (ICCQ) is an online survey designed to facilitate international comparisons into the relatively – …
A group-based recidivist sentencing premium? The role of context and cohort effects in the sentencing of terrorist offenders
Despite recent interest in terrorism little is known about the sentencing of terrorist offenders, and the impact of cohort effects on the sentencing patterns of offenders over the course of – …
Spreading the message digitally: A look into extremist organizations’ use of the Internet
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …
Advances in Research on Illicit Networks
Social network analysis finally reached a critical mass of scholars in the field of criminology. The proven track record of network theory and methods in fostering new advances in our – …
Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected
This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. The book aims to show that networks should be – …
TSAS WP16-05: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism
This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism?
Timing is everything: The role of contextual and terrorism specific factors in the sentencing outcomes of terrorist offenders
The punishment of terrorist offenders remains a relatively unexplored topic. Research is especially needed in the United Kingdom in light of the continued criminalization of terrorism-specific offences and the July – …
Toward a criminology of inmate networks.
Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected
Need, connections, or competence? Criminal achievement among adolescent offenders
Keeping promises: Logic models, and the design or a new classification of gang control strategies.
Advances in research on illicit networks
Opportunity structures of organized crime
Assessing the core membership of a youth gang from its co-offending network
Estimating the prevalence and risks of incarceration of sexual offenders
Efficacité des initiatives de contrôle des gangs de rue: Une revue systématique des recherches évaluatives
TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens
In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …
Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor
It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …