Detecting deterrence from patrol data
Dobson, A., Milner-Gulland, E. J., Beale, C., Ibbett, H. and Keane, A. (2018). Detecting deterrence from patrol data. 5th European Congress of Conservation Biology. doi: 10.17011/conference/eccb2018/107778
Date
2018Copyright
© the Authors, 2018
The threat posed to protected areas (PAs) by the illegal killing of wildlife is countered principally by ranger patrols that aim to detect and deter potential offenders. Deterring poaching is a fundamental conservation objective [1]. However, deterrence is difficult to identify, especially when the prime source of information comes in the form of the patrols’ own records, which inevitably contain biases [2]. Sophisticated statistical techniques for the analysis of patrol data have been developed which considerable promise [3], but there is also a need for simple, widely-applicable metrics which can reliably detect deterrence. Here, we present a mechanistic model of law-breaking and law enforcement in which we simulate deterrence alongside exogenous changes in the frequency of offences, under different temporal patterns of enforcement effort. We use this to compare the performance of a set of candidate metrics that can be derived from patrol data alone. We find that plots of infractions detected per unit of patrol effort against patrol effort (IPUE-E plots) are not reliable indicators of deterrence. However, plots of change in IPUE over change in effort (ΔIPUE-ΔE) reliably diagnose deterrence, regardless of the temporal distribution of effort or any exogenous change in illegal activity levels, as long as data are collected such that detection probability does not saturate with increased effort, and when the time-lag between patrol effort and subsequent behavioural change among offenders is approximately known. ΔIPUE-ΔE plots are no more conceptually complicated than the basic IPUE-effort plots, and require no specialist knowledge or software to produce. ΔIPUE-ΔE offers a robust, simple, metric for monitoring patrol effectiveness where detection is proportional to effort. This work provides key insights into the nature of patrol data, as well as practical recommendations for on-the-ground data interpretation.
1. Wright EM, Bhammar HM, Gonzalez Velosa AM, Sobrevila C (2016) Analysis of international funding to tackle illegal wildlife trade. (Washington, D.C.: World Bank Group. http://documents.worldbank.org/curated/en/695451479221164739/Analysis-of-international-funding-to-tackle-illegal-wildlife-trade). Accessed 26/9/17.
2. Keane A, Jones JP, Milner‐Gulland EJ (2011) Encounter data in resource management and ecology: pitfalls and possibilities. J Appl Ecol 48(5):1164-1173.
3. Critchlow R, Plumptre AJ, Driciru M, Rwetsiba A, Stokes EJ, Tumwesigye C, Wanyama F, Beale CM (2015) Spatiotemporal trends of illegal activities from ranger‐collected data in a Ugandan national park. Conserv Biol 29(5):1458-1470.
...
Publisher
Open Science Centre, University of JyväskyläConference
ECCB2018: 5th European Congress of Conservation Biology. 12th - 15th of June 2018, Jyväskylä, Finland
Original source
https://peerageofscience.org/conference/eccb2018/107778/Metadata
Show full item recordCollections
- ECCB 2018 [712]
License
Related items
Showing items with similar title or keywords.
-
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
Impact of deterrence theory methods on employees' information security behavior
Kuhalampi, Mikko (2017)Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen ... -
Don’t feed the troll : response strategies for false reviews among small Finnish service sector companies
Pirilä, Mikko (2022)Internet -arvostelut jäävät toiseksi vain perheen ja ystävien suosituksille ja että niitä luetaan yhä enemmän, on niiden vaikutus ostopäätökseen huomattava. Internet -arvosteluiden sivutuote, valearvostelut ovat arvosteluita, ... -
IS Security Policy Violations : A Rational Choice Perspective
Siponen, Mikko T.; Vance, Anthony (IGI Global, 2012)Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has ... -
Understanding Crowdturfing : The Different Ethical Logics Behind the Clandestine Industry of Deception
Rinta-Kahila, Tapani; Soliman, Wael (European Conference on Information Systems, 2017)Crowdturfing, the dark side and usually unnoticed face of crowdsourcing, represents a form of cyber-deception in which workers are paid to express a false digital impression. While such behavior may not be punishable under ...