Dr. Martin Bouchard

Martin Bouchard is a Professor at the School of Criminology, Simon Fraser University and the former Director of the ICCRC. Dr. Bouchard received his PhD in Criminology from the University of Montreal, and completed postdoctoral work at the University of Maryland. His work focuses on the organization and dynamics of illicit markets and on examining the impact of social networks in various criminal career outcomes. He also published extensively on street gangs, organized crime, and methodologies to estimate the size of illicit markets. His interest in cybercrime includes examining the structure of online criminal networks, as well as the role of the Internet in facilitating co-offending and criminal innovation.

 

Contact Information:
Email: mbouchard@sfu.ca
Phone: +1 (778) 782-8135

Additional Information:
Website
Twitter
Google Scholar Citation Page
ResearchGate Page

Relevant Publications:

Bouchard, M., Davies, G., Frank, R., Wu, E., & Joffres, K. (Forthcoming). The Social Structure of Extremist Websites. In J. Littlewood, L. Dawson, & S. Thompson (Eds.), Canada Among Nations: Terrorism and Counterterrorism. University of Toronto Press.

Levey, P., & Bouchard, M. (2019). The Emergence of Violent Narratives in the Life-Course Trajectories of Online Forum Participants. Journal of Qualitative Criminal Justice and Criminology.

Westlake, B., Bouchard, M., & Girodat, A. (2016). How Obvious Is It? The Content of Child Sexual Exploitation Websites. Deviant Behavior, DOI: 10.1080/01639625.2016.1197001

Bouchard, M., & Westlake, B. (2016). La détection de communautés au sein de réseaux criminels en ligne et ses implications pour les recherches en co-délinquance. In Rémi Boivin and Carlo Morselli (Eds.), Les réseaux criminels. Les Presses de l’Université de Montréal.

Davies, G., Neudecker, C., Ouellet, M., Bouchard, M., & Ducol, B. (2016). Toward a Framework to Assess Online Programs for Countering Violent Extremism. Journal for Deradicalization, 6, 51-86.

Ducol, B., Bouchard, M., Davies, G., Ouellet, M., & Neudecker, C. (2016). Assessment of the State of Knowledge: Connections between Research on the Social Psychology of the Internet and Violent Extremism. Canadian Network for Research on Terrorism, Security and Society: No.16-05.

Westlake, B., & Bouchard, M. (2016). Liking and Hyperlinking: Community Detection in Online Child Exploitation Networks. Social Science Research, 59, 23-36.

Westlake, B., Bouchard, M., & Frank, R. (2015). Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation. Sexual Abuse: A Journal of Research and Treatment, DOI: 10.1177/1079063215616818

Westlake, B., & Bouchard, M. (2015). Criminal Careers in Cyberspace: Examining Website Failure within Child Exploitation Networks. Justice Quarterly, 33(7), 1154-1181

Allsup, R., Thomas, E., Monk, B., Frank, R., & Bouchard, M. (2015). Networking in Child Exploitation – Assessing Disruption Strategies Using Registrant Information. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

Bouchard, M., & Thomas, E. (2015). Radical and Connected: Concluding Thoughts and Future Research. In M. Bouchard (Ed.). Social Network, Terrorism and Counter-Terrorism: Radical and Connected. Routledge.

Bouchard, M., & Levey, P. (2015). Radical and Connected: An Introduction. In M. Bouchard (Ed.). Social Network, Terrorism and Counter-Terrorism: Radical and Connected. Routledge.

Davies, G., Bouchard, M., Wu, E., Joffres, K., & Frank, R. (2015). Terrorist and Extremist Organizations’ use of the Internet for Recruitment. In M. Bouchard (Ed.) Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected (pp. 105-127). Routledge.

Bouchard, M., & Nash, R. (2015). Researching Terrorism and Counter-Terrorism through a Network Lens. In M. Bouchard (Ed.) Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected (pp. 48-60). Routledge.

Frank, R., Bouchard, M., Davies, G., & Mei, J. (2015). Spreading the Message Digitally: A Look into Extremist Organizations’ use of the Internet. In R. G. Smith, R.C.-C. Cheung and L.Y.-C. Lau (Eds.) Cybercrime Risks and Responses: Eastern and Western Perspectives. Palgrave.

Joffres, K., & Bouchard, M. (2015). Vulnerabilities in Online Child Pornography Networks. In A. Malm and G. Bichler (Eds.), Disrupting Criminal Networks: Network Analysis in Crime Prevention (pp. 153-176). Crime Prevention Studies, Monsey, NY: Criminal Justice Press.

Bouchard, M. (2014). Outils et méthodes pour la construction et l’analyse des réseaux illicites sur Internet. Revue Internationale de Criminologie et de Police Technique et Scientifique, 67, 317-337.

Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor. In V. Mago and V. Dabbaghian (Eds.), Computational Models of Complex Systems (pp. 171-184). Springer.

Bouchard, M. (2013). Merging Computing and Crime Science: The Development of a Web-Crawling Tool to Investigate Cybercrime. Translational Criminology, 5, 15-17.

Westlake, B., Bouchard, M., & Frank, R. (2012). Comparing Methods for Detecting Child Exploitation Content Online. In Proceedings of the 2012 European Intelligence and Security Informatics Conference (EISIC).

Basamanowicz, J., & Bouchard, M. (2011). Overcoming the Warez Paradox: Situational Crime Prevention and Warez Scene Piracy. Policy & Internet, 3, 1-25.

Joffres, K., Bouchard, M., Frank, R., & Westlake, B. (2011). Strategies to Disrupt Online Child Exploitation Networks. In Proceedings of the 2011 European Intelligence and Security Informatics Conference (EISIC).
*Won the Honorable Mention Award for Best Paper at the 2011 EISIC conference

Westlake, B., Bouchard, M., & Frank, R. (2011). Finding the Key Players in Online Child Exploitation Networks. Policy & Internet, 3, 1-32.

Frank, R., Westlake, B., & Bouchard, M. (2010). The Structure and Content of Online Child Exploitation Networks. In Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (KDD).