Online Networks – Complete Publications List

Bouchard, M., Davies, G., Frank, R., Wu, Edith, & Joffres, K. (2020). Social structure of extremist websites. In J. Littlewood & L. L. Dawson (Eds.), Terrorism and Counterterrorism in Canada. Toronto: University of Toronto Press.

Through close analysis of the Canadian context, Terrorism and Counterterrorism in Canada provides an advanced introduction to the challenges and social consequences presented by terrorism today. Featuring contributions from both established and emerging scholars, it tackles key issues within this fraught area and does so from multiple disciplinary perspectives, using historical, quantitative, and qualitative lenses of analyses...

Kusz, J., & Bouchard, M. (2019). Nymphet or Lolita? A Gender Analysis of Online Child Pornography Websites. Deviant Behavior, 1-9.

Previous research on child pornography has primarily focused on the consumption and distribution of the material – the consumer side. In this study, we turn the focus on the content of child pornography websites. While some research assessed the content, there was little consideration of gender. This paper assesses whether gender is important in correlating...

Levey, P., & Bouchard, M. (2019). The emergence of violent narratives in the life-course trajectories of online forum participants. Journal of Qualitative Criminal Justice & Criminology, 6(3), 1-28.

Online discussion forums have been identified as an online social milieu that may facilitate the radicalization process, or the development of violent narratives for a minority of participants, notably youth. Yet, very little is known on the nature of the conversations youth have online, the emotions they convey, and whether or how the sentiments expressed...

Westlake, B. G., Bouchard, M., & Girodat, A. (2017). How obvious is it? The content of child sexual exploitation websites. Deviant Behavior, 38(3), 282-293.

Those who distribute child sexual exploitation (CE) material in the public Internet potentially face greater risks of detection. While public distribution is prevalent, little is known about the structure of these websites. We investigate whether websites take steps to hide their purpose, and, if so, what steps are taken? We analyze 634 websites directly or...

Westlake, B., Bouchard, M., & Frank, R. (2017). Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse, 29(7), 685-708.

The distribution of child sexual exploitation (CE) material has been aided by the growth of the Internet. The graphic nature and prevalence of the material has made researching and combating difficult. Although used to study online CE distribution, automated data collection tools (e.g., webcrawlers) have yet to be shown effective at targeting only relevant data....

Davies, G., Neudecker, C., Ouellet, M., Bouchard, M., & Ducol, B. (2016). Toward a framework understanding of online programs for countering violent extremism. Journal for Deradicalization, (6), 51-86.

There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that...

Westlake, B. G., & Bouchard, M. (2016). Liking and hyperlinking: Community detection in online child sexual exploitation networks. Social Science Research, 59, 23-36.

The online sexual exploitation of children is facilitated by websites that form virtual communities, via hyperlinks, to distribute images, videos, and other material. However, how these communities form, are structured, and evolve over time is unknown. Collected using a custom-designed webcrawler, we begin from known child sexual exploitation (CE) seed websites and follow hyperlinks to...

G. Westlake, B., & Bouchard, M. (2016). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly, 33(7), 1154-1181.

Publicly accessible, illegal, websites represents an additional challenge for control agencies, but also an opportunity for researchers to monitor, in real-time, changes in criminal careers. Using a repeated measures design, we examine evolution in the networks that form around child exploitation (CE) websites, over a period of sixty weeks, and determine which criminal career dimensions...

Davies, G., Bouchard, M., Wu, E., Joffres, K., & Frank, R. (2015). Terrorist and extremist organizations’ use of the Internet for recruitment. In M. Bouchard (Ed.), Social networks, terrorism and counter-terrorism: Radical and connected (pp. 105-127). New York, NY: Routledge Publishing.

While recruitment is central to the viability of all groups, the process itself is not necessarily consistent across groups. The purpose of this study is to examine the manner in which and the extent to which terrorist and extremist groups use the Internet for the purpose of recruitment. Based on the two dimensions of intensity...

Frank, R., Bouchard, M., Davies, G., & Mei, J. (2015). Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet. In Y. Lau (Ed.), Cybercrime risks and responses (pp. 130-145). London, UK: Palgrave Macmillan.

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility...

Joffres, K., Bouchard, M. (2015). Vulnerabilities in online child pornography networks. In Aili Malm and Gisela Bichler (Eds), Disrupting Criminal networks: Network Analysis in Crime Prevention. Crime Prevention Studies, Monsey, NY: Criminal Justice Press.

Rienner Amazon

Allsup, R., Thomas, E., Monk, B., Frank, R., & Bouchard, M. (2015). Networking in child exploitation: assessing disruption strategies using registrant information. Proceedings from The 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 400-407. Paris, France: ASONAM.

This research utilizes social network analysis to determine the success of three different disruption strategies on a child exploitation network extracted from the public internet. Using a custom-written web-crawler called LECEN, data from a set of hyperlinked child-exploitation websites was collected from the Internet. From these data, two types of networks were coded: the nodes...

Bouchard, M. (2014). Outils et méthodes pour la construction et l’analyse des réseaux illicites sur Internet. Revue Internationale de Criminologie et de Police Technique et Scientifique, 67, 317-337.

On sait maintenant que l’arrivée du Web a complètement changé la donne en ce qui concerne l’exploitation des jeunes à des fins sexuelles, alors que pédophiles et autres amateurs de pornographie juvénile profitent désormais de la toile pour consommer, distribuer, échanger du matériel. Ils profitent également de ces réseaux virtuels pour «socialiser» avec d’autres qui...

Bouchard, M., Joffres, K., Frank, R. (2014). Preliminary analytical considerations in designing a terrorism and extremism online network extractor. Pp. 171-184 in V. Mago and V. Dabbaghian, and (Eds), Computational Models of Complex Systems. New York: Springer.

It is now widely understood that extremists use the Internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet. In particular, this chapter will focus on how TENE may help differentiate...

Bouchard, M. (2013). Merging Computing and Crime Science: The Development of a Web-Crawling Tool to Investigate Cybercrime. Translational Criminology, 15-21.

Link to full text

Westlake, B., Bouchard, M., Frank, R. (2012). Comparing methods for detecting child exploitation content online. Proceedings of the EISIC - European Intelligence and Security Informatics, Odense, 156-163.

The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content....

Westlake, B., Bouchard, M., Frank, R. (2011). Finding the key players in online child exploitation networks. Policy and Internet, 3(6), 1-32.

The growth of the Internet has been paralleled with a similar growth in online child exploitation. Since completely shutting down child exploitation websites is difficult (or arguably impossible), the goal must be to find the most efficient way of identifying the key targets and then to apprehend them. Traditionally, online investigations have been manual and...

Joffres, K., Bouchard, M., Frank, R., Westlake, B. (2011). Strategies to disrupt online child exploitation networks. Proceedings of the EISIC - European Intelligence and Security Informatics, Athens, September 2011, pp. 163-170.

This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found...

Frank, R., Westlake, B., Bouchard, M. (2010). The structure and content of online child exploitation networks. Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD 2010).

The emergence of the Internet has provided people with the ability to find and communicate with others of common interests. Unfortunately, those involved in the practices of child exploitation have also received the same benefits. Although law enforcement continues its efforts to shut down websites dedicated to child exploitation, the problem remains uncurbed. Despite this,...