Violent Extremism

Selected publications are shown below, a complete listing can be found here.

Bouchard, M. (Ed.). (2015). Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected. New York: Routledge.

This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. It aims to show that networks should be at the forefront when analysing terrorists, but also when assessing the responses to their actions. The volume makes a unique contribution by addressing two relatively new...

Amirault, J., Bouchard, M. (2015). Timing is everything: The role of contextual and terrorism specific factors in the sentencing outcomes of terrorist offenders. European Journal of Criminology. Online First.

The punishment of terrorist offenders remains a relatively unexplored topic. Research is especially needed in the United Kingdom in light of the continued criminalization of terrorismspecific offences and the July 2005 bombings. Using a sample of terrorist offenders convicted in the United Kingdom (n = 156), the current study examines the impact of legislative and...

Amirault, J., Bouchard, M. (2015). A group-based sentencing premium? The role of context and cohort effects in the sentencing of terrorist offenders. International Journal of Law, Crime, and Justice. Online First

Despite recent interest in terrorism little is known about the sentencing of terrorist offenders, and the impact of cohort effects on the sentencing patterns of offenders over the course of a terrorist campaign remains virtually unexplored. The ‘recidivist sentencing premium’ states that offenders who continually engage in criminal activities should be sanctioned more harshly as...

Bouchard, M., Joffres, K., Frank, R. (2014). Preliminary analytical considerations in designing a terrorism and extremism online network extractor. Pp. 171-184 in V. Mago and V. Dabbaghian, and (Eds), Computational Models of Complex Systems. New York: Springer.

It is now widely understood that extremists use the Internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet. In particular, this chapter will focus on how TENE may help differentiate...