Detecting deterrence from patrol data
Dobson, A., Milner-Gulland, E. J., Beale, C., Ibbett, H. and Keane, A. (2018). Detecting deterrence from patrol data. 5th European Congress of Conservation Biology. doi: 10.17011/conference/eccb2018/107778
© the Authors, 2018
The threat posed to protected areas (PAs) by the illegal killing of wildlife is countered principally by ranger patrols that aim to detect and deter potential offenders. Deterring poaching is a fundamental conservation objective . However, deterrence is difficult to identify, especially when the prime source of information comes in the form of the patrols’ own records, which inevitably contain biases . Sophisticated statistical techniques for the analysis of patrol data have been developed which considerable promise , but there is also a need for simple, widely-applicable metrics which can reliably detect deterrence. Here, we present a mechanistic model of law-breaking and law enforcement in which we simulate deterrence alongside exogenous changes in the frequency of offences, under different temporal patterns of enforcement effort. We use this to compare the performance of a set of candidate metrics that can be derived from patrol data alone. We find that plots of infractions detected per unit of patrol effort against patrol effort (IPUE-E plots) are not reliable indicators of deterrence. However, plots of change in IPUE over change in effort (ΔIPUE-ΔE) reliably diagnose deterrence, regardless of the temporal distribution of effort or any exogenous change in illegal activity levels, as long as data are collected such that detection probability does not saturate with increased effort, and when the time-lag between patrol effort and subsequent behavioural change among offenders is approximately known. ΔIPUE-ΔE plots are no more conceptually complicated than the basic IPUE-effort plots, and require no specialist knowledge or software to produce. ΔIPUE-ΔE offers a robust, simple, metric for monitoring patrol effectiveness where detection is proportional to effort. This work provides key insights into the nature of patrol data, as well as practical recommendations for on-the-ground data interpretation. 1. Wright EM, Bhammar HM, Gonzalez Velosa AM, Sobrevila C (2016) Analysis of international funding to tackle illegal wildlife trade. (Washington, D.C.: World Bank Group. http://documents.worldbank.org/curated/en/695451479221164739/Analysis-of-international-funding-to-tackle-illegal-wildlife-trade). Accessed 26/9/17. 2. Keane A, Jones JP, Milner‐Gulland EJ (2011) Encounter data in resource management and ecology: pitfalls and possibilities. J Appl Ecol 48(5):1164-1173. 3. Critchlow R, Plumptre AJ, Driciru M, Rwetsiba A, Stokes EJ, Tumwesigye C, Wanyama F, Beale CM (2015) Spatiotemporal trends of illegal activities from ranger‐collected data in a Ugandan national park. Conserv Biol 29(5):1458-1470. ...
PublisherOpen Science Centre, University of Jyväskylä
ConferenceECCB2018: 5th European Congress of Conservation Biology. 12th - 15th of June 2018, Jyväskylä, Finland
MetadataShow full item record
- ECCB 2018 
Showing items with similar title or keywords.
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ...
Anti, Emmanuel (2019)Insider threats has been a major challenge for organizations. Leaking sensitive information by insiders has become rampant in recent times and presents an important issue for both private and public organizations. Though ...
Understanding Crowdturfing : The Different Ethical Logics Behind the Clandestine Industry of Deception Rinta-Kahila, Tapani; Soliman, Wael (European Conference on Information Systems, 2017)Crowdturfing, the dark side and usually unnoticed face of crowdsourcing, represents a form of cyber-deception in which workers are paid to express a false digital impression. While such behavior may not be punishable under ...
Kinnunen, Sanna (2016)Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Offense-to-Self Theory (SOS), to better understand information security behavior (ISB). In addition, more commonly used ...
Siponen, Mikko T.; Vance, Anthony (IGI Global, 2012)Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has ...