28 resultados para predator-prey
Resumo:
Rodenticide use in agriculture can lead to the secondary poisoning of avian predators. Currently the Australian sugarcane industry has two rodenticides, Racumin® and Rattoff®, available for in-crop use but, like many agricultural industries, it lacks an ecologically-based method of determining the potential secondary poisoning risk the use of these rodenticides poses to avian predators. The material presented in this thesis addresses this by: a. determining where predator/prey interactions take place in sugar producing districts; b. quantifying the amount of rodenticide available to avian predators and the probability of encounter; and c. developing a stochastic model that allows secondary poisoning risk under various rodenticide application scenarios to be investigated. Results demonstrate that predator/prey interactions are highly constrained by environmental structure. Rodents used crops that provided high levels of canopy cover and therefore predator protection and poorly utilised open canopy areas. In contrast, raptors over-utilised areas with low canopy cover and low rodent densities, but which provided high accessibility to prey. Given this pattern of habitat use, and that industry baiting protocols preclude rodenticide application in open canopy crops, these results indicate that secondary poisoning can only occur if poisoned rodents leave closed canopy crops and become available for predation in open canopy areas. Results further demonstrate that after in-crop rodenticide application, only a small proportion of rodents available in open areas are poisoned and that these rodents carry low levels of toxicant. Coupled with the low level of rodenticide use in the sugar industry, the high toxic threshold raptors have to these toxicants and the low probability of encountering poisoned rodents, results indicate that the risk of secondary poisoning events occurring is minimal. A stochastic model was developed to investigate the effect of manipulating factors that might influence secondary poisoning hazard in a sugarcane agro-ecosystem. These simulations further suggest that in all but extreme scenarios, the risk of secondary poisoning is also minimal. Collectively, these studies demonstrate that secondary poisoning of avian predators associated with the use of the currently available rodenticides in Australian sugar producing districts is minimal. Further, the ecologically-based method of assessing secondary poisoning risk developed in this thesis has broader applications in other agricultural systems where rodenticide use may pose risks to avian predators.
Resumo:
Introduced predators can have pronounced effects on naïve prey species; thus, predator control is often essential for conservation of threatened native species. Complete eradication of the predator, although desirable, may be elusive in budget-limited situations, whereas predator suppression is more feasible and may still achieve conservation goals. We used a stochastic predator-prey model based on a Lotka-Volterra system to investigate the cost-effectiveness of predator control to achieve prey conservation. We compared five control strategies: immediate eradication, removal of a constant number of predators (fixed-number control), removal of a constant proportion of predators (fixed-rate control), removal of predators that exceed a predetermined threshold (upper-trigger harvest), and removal of predators whenever their population falls below a lower predetermined threshold (lower-trigger harvest). We looked at the performance of these strategies when managers could always remove the full number of predators targeted by each strategy, subject to budget availability. Under this assumption immediate eradication reduced the threat to the prey population the most. We then examined the effect of reduced management success in meeting removal targets, assuming removal is more difficult at low predator densities. In this case there was a pronounced reduction in performance of the immediate eradication, fixed-number, and lower-trigger strategies. Although immediate eradication still yielded the highest expected minimum prey population size, upper-trigger harvest yielded the lowest probability of prey extinction and the greatest return on investment (as measured by improvement in expected minimum population size per amount spent). Upper-trigger harvest was relatively successful because it operated when predator density was highest, which is when predator removal targets can be more easily met and the effect of predators on the prey is most damaging. This suggests that controlling predators only when they are most abundant is the "best" strategy when financial resources are limited and eradication is unlikely. © 2008 Society for Conservation Biology.
Resumo:
It is becoming increasingly popular to consider species interactions when managing ecological foodwebs. Such an approach is useful in determining how management can affect multiple species, with either beneficial or detrimental consequences. Identifying such actions is particularly valuable in the context of conservation decision making as funding is severely limited. This paper outlines a new approach that simplifies the resource allocation problem in a two species system for a range of species interactions: independent, mutualism, predator-prey, and competitive exclusion. We assume that both species are endangered and we do not account for decisions over time. We find that optimal funding allocation is to the conservation of the species with the highest marginal gain in expected probability of survival and that, across all except mutualist interaction types, optimal conservation funding allocation differs between species. Loss in efficiency from ignoring species interactions was most severe in predator-prey systems. The funding problem we address, where an ecosystem includes multiple threatened species, will only become more commonplace as increasing numbers of species worldwide become threatened. © 2011 Elsevier B.V.
Resumo:
Outbreaks of the coral-killing seastar Acanthaster planci are intense disturbances that can decimate coral reefs. These events consist of the emergence of large swarms of the predatory seastar that feed on reef-building corals, often leading to widespread devastation of coral populations. While cyclic occurrences of such outbreaks are reported from many tropical reefs throughout the Indo-Pacific, their causes are hotly debated, and the spatio-temporal dynamics of the outbreaks and impacts to reef communities remain unclear. Based on observations of a recent event around the island of Moorea, French Polynesia, we show that Acanthaster outbreaks are methodic, slow-paced, and diffusive biological disturbances. Acanthaster outbreaks on insular reef systems like Moorea's appear to originate from restricted areas confined to the ocean-exposed base of reefs. Elevated Acanthaster densities then progressively spread to adjacent and shallower locations by migrations of seastars in aggregative waves that eventually affect the entire reef system. The directional migration across reefs appears to be a search for prey as reef portions affected by dense seastar aggregations are rapidly depleted of living corals and subsequently left behind. Coral decline on impacted reefs occurs by the sequential consumption of species in the order of Acanthaster feeding preferences. Acanthaster outbreaks thus result in predictable alteration of the coral community structure. The outbreak we report here is among the most intense and devastating ever reported. Using a hierarchical, multi-scale approach, we also show how sessile benthic communities and resident coral-feeding fish assemblages were subsequently affected by the decline of corals. By elucidating the processes involved in an Acanthaster outbreak, our study contributes to comprehending this widespread disturbance and should thus benefit targeted management actions for coral reef ecosystems.
Resumo:
Two representations have dominated public perceptions of the largest living marsupial carnivore, the Tasmanian devil. One is the voracious, hurricane-like innocent savage Taz of Looney Tunes cartoon fame. The other, familiar in nineteenth- and twentieth-century rural Tasmania, is the ferocious predator and scavenger that wantonly kills livestock — and perhaps even people, should they become immobilized in the wilderness at night. Devils can take prey nearly three times their size and eat more than a third of their body weight in a sitting. Even so, it is hard to imagine how this species, being only slightly larger than a fox terrier, could be so maligned in name and image...
Resumo:
Financial literacy may not be as effective as previously thought in protecting against fraud victimisation. It does not inoculate investors from persuasion or social engineering tactics used by offenders to secure investment in fraudulent schemes. In fact, recent research indicates that overconfidence in investment knowledge may make individuals more susceptible to fraud. Using boiler room fraud as a case study, this article introduces the PREY (Profiled, Relational, Exploitable and Yielding) model to capture the psychological tactics used by fraud perpetrators to influence the thoughts and decision-making processes of individuals. The PREY model operationalizes the tenets of social engineering and demonstrates how such tactics could be re-engineered to increase the effectiveness of fraud prevention within the financial literacy context.
Resumo:
Lack of water can be the least of a farmer’s worries in times of drought. Predatory banks can be just as deadly to a farmer’s livelihood. Former Queensland farmer and grazier Lynton Freeman has become increasingly anxious about the financial tightrope being walked by Australian farmers as the record floods of 2011 have given way in only three years to savage drought. He fears for hundreds of family farmers at risk — not from lack of water, but from lack of knowledge in how to manage their businesses through the drought and keep their heads above the financial water that will threaten many before this drought breaks.
Resumo:
The low- and high-frequency components of a rustling sound, created when prey (freshly killed frog) was jerkily pulled on dry and wet sandy floors and asbestos, were recorded and played back to individual Indian false vampire bats (Megaderma lyra). Megaderma lyra responded with flight toward the speakers and captured dead frogs, that were kept as reward. The spectral peaks were at 8.6, 7.1 and 6.8 kHz for the low-frequency components of the sounds created at the dry, asbestos and wet floors, respectively. The spectral peaks for the high-frequency sounds created on the respective floors were at 36.8,27.2 and 23.3 kHz. The sound from the dry floor was more intense than that of from the other two substrata. Prey movements that generated sonic or ultrasonic sounds were both sufficient and necessary for the bats to detect and capture prey. The number of successful prey captures was significantly greater for the dry floor sound, especially to its high-frequency components. Bat-responses were low to the wet floor and moderate to the asbestos floor sounds. The bats did not respond to the sound of unrecorded parts of the tape. Even though the bats flew toward the speakers when the prey generated sounds were played back and captured the dead frogs we cannot rule out the possibility of M. lyra using echolocation to localize prey. However, the study indicates that prey that move on dry sandy floor are more vulnerable to predation by M. lyra.
Resumo:
The silver-headed antechinus (Antechinus argentus) is one of Australia’s most recently described mammals, and the single known population at Kroombit Tops in south-east Queensland is threatened. Nothing is known of the species’ ecology, so during 2014 we collected faecal pellets each month (March–September) from a population at the type locality to gather baseline data on diet composition. A total of 38 faecal pellets were collected from 12 individuals (eight females, four males) and microscopic analysis of pellets identified seven invertebrate orders, with 70% combined mean composition of beetles (Coleoptera: 38%) and cockroaches (Blattodea: 32%). Other orders that featured as prey were ants, crickets/grasshoppers, butterflies/moths, spiders, and true bugs. Given that faecal pellets could only be collected from a single habitat type (Eucalyptus montivaga high-altitude open forest) and location, this is best described as a generalist insectivorous diet that is characteristic of other previously studied congeners.
Resumo:
The black rat (Rattus rattus) has been shown to be the primary species responsible for causing significant crop losses within the Australian macadamia industry. This species success within macadamia orchards is directly related to the flexibility expressed in its foraging behaviour. In this paper a conceptual foraging model is presented which proposes that the utilisation of resources by rodents within various components of the system is related not only to their relative abundance, but also to predator avoidance behaviour. Nut removal from high predation risk habitats during periods of low resource abundance in low risk compartments of the system is considered an essential behaviour that allows high rodent densities to be maintained throughout the year.
Resumo:
The Australian horror film is a fascinating specimen. While a tradition has antecedents in the silent era of cinema, and at times has produced popular and commercially successful titles, Australian horror films have existed among the shadows of Australian cinema. Within a national cinema funded by public subsidy to foster a sense of national identity, emphasizing ‘quality’ cultural films and refusing to recognize popular movie genres in attempt to differentiate itself from Hollywood, generic and low-culture horror films have been in opposition to these objectives. Consequently, horror movies have been heavily marginalized within public funding environments and mainstream film culture, and either ignored or despised by mainstream critics. The chapter provides a historical introduction to Australian horror cinema before reviewing a selection of recent Aussie horror titles, namely: Wolf Creek, Undead, Black Water, Dying Breed, Lost Things, Prey, Cut, Rogue and Storm Warning.
Resumo:
The rise to prominence of citizen journalism is usually described as a paradigm shift in the relationship between news organizations and their audiences – ‘citizen’ or ‘amateur’ journalists are positioned as inherently different from, and possibly in competition with, ‘professional’ journalists. Some journalists in the industry have taken up this theme, and are at pains to distinguish their professional, supposedly objective and accountable practices from what they describe as the opinionated and partisan ‘armchair journalism’ of amateurs, while some citizen journalists, in turn, give as good at they get and describe the professionals as lackeys of their corporate masters who (willingly or unwittingly) fall prey to political and commercial spin. In fact, the very terminology we use to describe both sides creates the impression that professionals are not also citizens, and that citizen journalists are incapable of having professional skills and knowledges; in reality, of course, the lines between them are much less clear.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.