Detecting deterrence from patrol data
Dobson, A., Milner-Gulland, E. J., Beale, C., Ibbett, H. and Keane, A. (2018). Detecting deterrence from patrol data. 5th European Congress of Conservation Biology. doi: 10.17011/conference/eccb2018/107778
Päivämäärä
2018Tekijänoikeudet
© the Authors, 2018
The threat posed to protected areas (PAs) by the illegal killing of wildlife is countered principally by ranger patrols that aim to detect and deter potential offenders. Deterring poaching is a fundamental conservation objective [1]. However, deterrence is difficult to identify, especially when the prime source of information comes in the form of the patrols’ own records, which inevitably contain biases [2]. Sophisticated statistical techniques for the analysis of patrol data have been developed which considerable promise [3], but there is also a need for simple, widely-applicable metrics which can reliably detect deterrence. Here, we present a mechanistic model of law-breaking and law enforcement in which we simulate deterrence alongside exogenous changes in the frequency of offences, under different temporal patterns of enforcement effort. We use this to compare the performance of a set of candidate metrics that can be derived from patrol data alone. We find that plots of infractions detected per unit of patrol effort against patrol effort (IPUE-E plots) are not reliable indicators of deterrence. However, plots of change in IPUE over change in effort (ΔIPUE-ΔE) reliably diagnose deterrence, regardless of the temporal distribution of effort or any exogenous change in illegal activity levels, as long as data are collected such that detection probability does not saturate with increased effort, and when the time-lag between patrol effort and subsequent behavioural change among offenders is approximately known. ΔIPUE-ΔE plots are no more conceptually complicated than the basic IPUE-effort plots, and require no specialist knowledge or software to produce. ΔIPUE-ΔE offers a robust, simple, metric for monitoring patrol effectiveness where detection is proportional to effort. This work provides key insights into the nature of patrol data, as well as practical recommendations for on-the-ground data interpretation.
1. Wright EM, Bhammar HM, Gonzalez Velosa AM, Sobrevila C (2016) Analysis of international funding to tackle illegal wildlife trade. (Washington, D.C.: World Bank Group. http://documents.worldbank.org/curated/en/695451479221164739/Analysis-of-international-funding-to-tackle-illegal-wildlife-trade). Accessed 26/9/17.
2. Keane A, Jones JP, Milner‐Gulland EJ (2011) Encounter data in resource management and ecology: pitfalls and possibilities. J Appl Ecol 48(5):1164-1173.
3. Critchlow R, Plumptre AJ, Driciru M, Rwetsiba A, Stokes EJ, Tumwesigye C, Wanyama F, Beale CM (2015) Spatiotemporal trends of illegal activities from ranger‐collected data in a Ugandan national park. Conserv Biol 29(5):1458-1470.
...
Julkaisija
Open Science Centre, University of JyväskyläKonferenssi
ECCB2018: 5th European Congress of Conservation Biology. 12th - 15th of June 2018, Jyväskylä, Finland
Alkuperäislähde
https://peerageofscience.org/conference/eccb2018/107778/Metadata
Näytä kaikki kuvailutiedotKokoelmat
- ECCB 2018 [712]
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Effects of operational assessment of the 4:4 and 4:4/6:6 watch systems on sleepiness, fatigue, and stress responses during patrolling on a navy missile patrol boat
Myllylä, Mikko; Kyröläinen, Heikki; Ojanen, Tommi; Ruohola, Juha-Petri; Heinonen, Olli J.; Vahlberg, Tero; Parkkola, Kai I. (Taylor & Francis, 2022)The operation of naval vessels involves watchkeeping 24 h per day, which is globally carried out by a variety of different watch systems. In this study, the rotating 4:4 and fixed 4:4/6:6 two-section watch systems were ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
Evidence for the critical importance of anti-poaching patrols to protect African wildlife
Arcilla, Nicola; Gatti, Sylvain; King, Kelsey; Su, Shan (Open Science Centre, University of Jyväskylä, 2018)Tropical forests are on the front lines of the current global extinction crisis, and effective conservation strategies are crucial to prevent continued wildlife declines and extinctions. The establishment and maintenance ... -
Impact of deterrence theory methods on employees' information security behavior
Kuhalampi, Mikko (2017)Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen ... -
Don’t feed the troll : response strategies for false reviews among small Finnish service sector companies
Pirilä, Mikko (2022)Internet -arvostelut jäävät toiseksi vain perheen ja ystävien suosituksille ja että niitä luetaan yhä enemmän, on niiden vaikutus ostopäätökseen huomattava. Internet -arvosteluiden sivutuote, valearvostelut ovat arvosteluita, ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.