Welcome to SFU.ca.
You have reached this page because we have detected you have a browser that is not supported by our web site and its stylesheets. We are happy to bring you here a text version of the SFU site. It offers you all the site's links and info, but without the graphics.
You may be able to update your browser and take advantage of the full graphical website. This could be done FREE at one of the following links, depending on your computer and operating system.
Or you may simply continue with the text version.

*Windows:*
FireFox (Recommended) http://www.mozilla.com/en-US/firefox/
Netscape http://browser.netscape.com
Opera http://www.opera.com/

*Macintosh OSX:*
FireFox (Recommended) http://www.mozilla.com/en-US/firefox/
Netscape http://browser.netscape.com
Opera http://www.opera.com/

*Macintosh OS 8.5-9.22:*
The only currently supported browser that we know of is iCAB. This is a free browser to download and try, but there is a cost to purchase it.
http://www.icab.de/index.html

Publications by ICCRC members

Academic publications:

Bouchard, M., Joffres, K., Frank, R. (in press). Preliminary considerations in designing a terrorism and extremism online network extractor. In V. Dabbaghian, and V. Mago (Eds), Modelling and Simulation of Complex Social Systems. New York: Springer.

Westlake, B., Bouchard, M., Frank, R. (2012). Comparing methods for detecting child exploitation content online. Proceedings of the EISIC - European Intelligence and Security Informatics, Odense, August 2012.

Westlake, Bryce G.; Bouchard, Martin; and Frank, Richard (2011) "Finding the Key Players in Online Child Exploitation Networks, "Policy & Internet: 3: Article 6 (1-32).

Basamanowicz, J., Bouchard, M. (2011). Overcoming the warez paradox: Situational crime prevention and warez scene piracy. Policy and Internet, 3: Article 5 (1-25).

Joffres, K., Bouchard, M., Frank, R. & Westlake, B. (2011) Strategies to Disrupt Online Child Pornography Networks. Intelligence and Security Informatics Conference (EISIC) 2011, 163-170.

Frank, R., Westlake, B., Bouchard, M.: "The Structure and Content of Online Child Exploitation Networks", Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD 2010), Article 3.

Other publications:

Sutcliffe, D. (2013) Uncovering the Structure of Online Exploitation Networks. The Policy and Internet Blog, Oxford Internet Institute, University of Oxford.

Cartwright, B.E. (2011, February) Conducting cyber-research on bullying: A qualitative, textual analysis of www.bullying.org, presented at the Western Society of Criminology Conference 2011.

Frank, F. & Westlake, B. (2011, May) Determining Key Players in Online Child Exploitation Networks, presented at SFU Surrey Open House, Faculty of Arts & Social Sciences (Criminology) Presentations

Frank, R., Westlake, B. & Bouchard, M. (2011, February) Extracting Dark Cyber Networks, presented at Western Society of Criminology Conference 2011.

Westlake, B., Frank, R. & Bouchard, M. (2011, February) Online Child Exploitation: Finding the Key Players, presented at Western Society of Criminology 2011.

Frank, R., Cheng, C. & Pun, V. (2011) Social Media Sites: New Fora for Criminal, Communication and Investigation Opportunities. Public Safety Canada , August 2011, RDIMS 434480.

Joffres, K., Bouchard, M., Frank, R. & Westlake, B.(2011, September) Strategies to Disrupt Online Child Pornography Networks, Presented at EISIC 2011.
     *This presentation has received the Honorable Mention Award.