Have a personal or library account? Click to login
Automatic Acquisition and Sustainable Use of Political-Ecological Data Cover

Automatic Acquisition and Sustainable Use of Political-Ecological Data

By: Timothy C. Haas  
Open Access
|Jul 2018

References

  1. Aarts, B. 2011. Oxford Modern English Grammar, 448. Oxford: Oxford University Press.
  2. Allen, AM and Singh, NJ. 2016. “Linking movement ecology with wildlife management and conservation.” Frontiers in Ecology and Evolution, 3. DOI: 10.3389/fevo.2015.00155
  3. American Society for Indexing. 2018. Taxonomies & Controlled Vocabularies Special Interest Group. Available at: www.taxonomies-sig.org/about.htm [Last accessed 7 April 2018].
  4. Anwar, S, Zain, JM, Zolkipli, MF, Inayat, Z, Khan, S, Anthony, B and Chang, V. 2017. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. algorithms, 10(39). DOI: 10.3390/a10020039
  5. Blei, DM and Smyth, P. 2017. Science and data science. Proceedings of the National Academy of Sciences of the United States of America, 114(33): 86896892. DOI: 10.1073/pnas.1702076114
  6. Bodin, Ö, Crona, B, Thyresson, M, Golz, A-L and Tengö, M. 2014. Conservation success as a function of good alignment of social and ecological structures and processes. Conservation Biology, 28: 13711379. DOI: 10.1111/cobi.12306
  7. Braungart, M, McDonough, W and Bollinger, A. 2007. Cradle-to-cradle design: Creating healthy emissions – a strategy for eco-effective product and system design. Journal of Cleaner Production, 15: 13371348. DOI: 10.1016/j.jclepro.2006.08.003
  8. British Council. 2017. Multi-word Verbs. Available at: https://learnenglish.britishcouncil.org/en/quick-grammar/multi-word-verbs [Last accessed 11 September 2017].
  9. Brombal, D. 2017. Accuracy of environmental monitoring in China: Exploring the influence of institutional, political and ideological factors. Sustainability, 9(324). DOI: 10.3390/su9030324
  10. Ceballos, G, Ehrlich, PR, Barnosky, AD, García, A, Pringle, RM and Palmer, TM. 2015. Accelerated modern human-induced species losses: Entering the sixth mass extinction. Science Advances, 1(5): e1400253. DOI: 10.1126/sciadv.1400253
  11. Cedar Creek. 2018. Data use policies. Cedar Creek Ecosystem Science Reserve. Available at: https://www.cedarcreek.umn.edu/research/datadatause [Last accessed 3 April 2018].
  12. Cordeiro, J, Dias, G and Brazdil, P. 2007. A Metric for paraphrase detection. Proceedings of the International Multi-Conference on Computing in the Global Information Technology. IEEE Computer Society. Available at: http://ieeexplore.ieee.org/document/4137062/ [Last accessed 11 September 2017].
  13. Daelemans, W, Buchholz, S and Veenstra, J. 1999. Memory-based shallow parsing. In: Proceedings of the EACL’99 workshop on Computational Natural Language Learning (CoNLL-99), 5360. Bergen, Norway.
  14. Davies, DL and Bouldin, DW. 1979. A cluster separation measure. IEEE Transactions on Pattern Analysis and Machine Intelligence, PAMI-1(2): 224227. DOI: 10.1109/TPAMI.1979.4766909
  15. defenceWeb. 2017. A ranger’s view on rhino poaching. defenceWeb, July 11. Available at: http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=48522 [Last accessed 11 September 2017].
  16. de la Hoz, E, Paez-Reyes, R, Cochrane, G, Marsa-Maestre, I, Moreira-Lemus, JM and Alarcos, B. 2014. Detecting and defeating advanced man-in-the-middle attacks against TLS. 6th International Conference on Cyber Conflict, Brangetto, P, Maybaum, M and Stinissen, J (eds.). Available at: http://www.ccdcoe.org/cycon/2014/proceedings/d2r2s2_delahoz.pdf [Last accessed 17 March 2018].
  17. de Weerd, N, van Langevelde, F, van Oeveren, H, Nolet, BA, Kölzsch, A, Prins, HHT and de Boer, WF. 2015. Deriving animal behaviour from high-frequency GPS: Tracking cows in open and forested habitat. PLoS ONE, 10(6): e0129030. [Last accessed 4 April 2018]. DOI: 10.1371/journal.pone.0129030
  18. EnglishClub. 2017. Regular Verbs List. Available at: www.englishclub.com/vocabulary/regular-verbs-list.htm [Last accessed 11 September 2017].
  19. Farnsworth, E. 2005. Guidelines for Ethical Field Research on Rare Plant Species. New England Wild Flower Society, January. Available at: http://www.mass.gov/eea/docs/dfg/nhesp/regulatory-review/nepcopresearchguide.pdf [Last accessed 11 September 2017].
  20. Ferguson, CC. 1992. The statistical basis for spatial sampling of contaminated land. Ground Engineering, 3438. June.
  21. Francis, RA, Taylor, JD, Dibble, E, Strickland, B, Petro, VM, Easterwood, C and Wang, G. 2017. Restricted cross-scale habitat selection by American beavers. Current Zoology, 63(6): 703710. DOI: 10.1093/cz/zox059
  22. Frey, UJ and Cox, M. 2015. Building a diagnostic ontology of social-ecological systems. International Journal of the Commons, 9(2): 595618. DOI: 10.18352/ijc.505
  23. Gammon Ranges. 2017. Gammon Ranges (Nature Conservation Society) Survey. Data Discovery Portal, Terrestrial Ecosystem Research Network (TERN), The University of Queensland, Australia. Available at: http://portal.tern.org.au/#/4fb352b1 [Last accessed 2 April 2018].
  24. Gazzola, M. 2014. The Evaluation of Language Regimes, 375. Amsterdam: John Benjamins Publishing Company.
  25. GDAL. 2017. gdal translate. Available at: www.gdal.org/gdal_translate.html [Last accessed 9 September 2017].
  26. GMU. 2017. Classified Information and Personnel Security Clearances: University Policy Number 1119. University Policy, George Mason University. Available at: https://universitypolicy.gmu.edu/policies/classified-information-and-personnel-security-clearances/ [Last accessed 11 September 2017].
  27. Guinote, A. 2017. How power affects people: Activating, wanting, and goal seeking. Annual Review of Psychology, 68: 353381. DOI: 10.1146/annurev-psych-010416-044153
  28. Haas, TC. 2001. A web-based system for public-private sector collaborative ecosystem management. Stochastic Environmental Research and Risk Assessment, 15: 101131. DOI: 10.1007/s004770000062
  29. Haas, TC. 2011. Improving Natural Resource Management: Ecological and Political Models. Wiley-Blackwell, Chichester, U.K. DOI: 10.1002/9780470979334
  30. Haas, TC. 2018. Rhino Ecosystem Management Tool, online resource. Available at: www4.uwm.edu/people/haas/rhino_emt [Last accessed 21 March 2018].
  31. Haas, TC and Ferreira, SM. 2015. Federated databases and actionable intelligence: Using social network analysis to disrupt transnational wildlife trafficking criminal networks. Security Informatics, 4(1). DOI: 10.1186/s13388-015-0018-8
  32. Haas, TC and Ferreira, SM. 2016a. Conservation risks: When will rhinos be extinct? IEEE Transactions on Cybernetics, 46(8): 17211724. DOI: 10.1109/TCYB.2015.2470520
  33. Haas, TC and Ferreira, SM. 2016b. Combating rhino horn trafficking: The need to disrupt criminal networks. PLoS ONE, 11(11): e0167040. DOI: 10.1371/journal.pone.0167040
  34. Haas, TC and Ferreira, SM. 2018. Finding politically feasible conservation strategies: The case of wildlife trafficking. Ecological Applications, 28(20): 473494. DOI: 10.1002/eap.1662
  35. Hansman, S and Hut, R. 2005. A taxonomy of network and computer attacks. Computers & Security, 24: 3143. DOI: 10.1016/j.cose.2004.06.011
  36. Hedley, J. 2017. jsoup: Java HTML Parser. Available at: https://jsoup.org [Last accessed 11 September 2017].
  37. Hoff, E. 2003. Chapter 7: Language development in childhood. In: Handbook of Psychology, Vol. 6: Developmental Psychology, Lerner, RM, Easterbrooks, MA and Mistry, J (eds.). Hoboken, NJ: John Wiley and Sons. DOI: 10.1002/0471264385.wei0607
  38. Ignatow, G and Mihalcea, R. 2018. An Introduction to Text Mining, 310. Los Angeles: Sage Publications.
  39. Khimm, S. 2016. China’s gold rush in the hills of Appalachia. Foreign Policy, September 7. Available at: http://foreignpolicy.com/2016/09/07/the-thrill-of-the-hunt-ginseng-smuggling-poaching-boone-north-carolina-china/ [Last accessed 11 September 2017].
  40. Koh, LP. 2015. Poachers expected to use green drones to kill endangered wildlife. Ecological Society of Australia. https://www.ecolsoc.org.au/poachers-expected-use-green-drones-kill-endangered-wildlife [Last accessed 26 May 2018].
  41. Köhler, M, Lukić, I and Čik, VK. 2017. Protecting information with subcodstanography. Security and Communication Networks, 13. Article ID 9130683. DOI: 10.1155/2017/9130683 [Last accessed 15 March 2018].
  42. Kranacher, M, Riley, RA, Jr. and Wells, JT. 2011. Forensic Accounting and Fraud Examination. New York: Wiley.
  43. Laurila-Pant, M, Lehikoinen, A, Uusitalo, L and Venesjärvi, R. 2015. How to value biodiversity in environmental management? Ecological Indicators, 55: 111. DOI: 10.1016/j.ecolind.2015.02.034
  44. Legalbrief. 2017. Government slated for withholding rhino poaching data. Legalbrief, May 24. Available at: legalbrief.co.za/diary/legalbrief-environmental/story/…withholding…poaching…/pdf/ [Last accessed 11 September 2017].
  45. Leng, RJ. 1999. Behavioral Correlates of War, 1816–1979 (Computer File), 3rd Release, Middlebury College, Middlebury, VT, 1993, Study Number 8606 from the Inter-University Consortium for Political and Social Research (ICPSR), Ann Arbor, Michigan, USA. Available at: www.icpsr.umich.edu [Last accessed 12 January 2010].
  46. Leng, RJ and Singer, JD. 1988. Militarized interstate crises: The BCOW typology and its applications. International Studies Quarterly, 32: 155173. DOI: 10.2307/2600625
  47. Lenzen, M, Moran, D, Kanemoto, K, Foran, B, Lobefaro, L and Geschke, A. 2012. International trade drives biodiversity threats in developing nations. Nature, 486: 109112. June 7.
  48. Levenshtein, A. 1966. Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady, 10(8): 707710.
  49. Library of Congress. 2017. RAR Archive Fiel Format, Version 5. Available at: https://www.loc.gov/preservation/digital/formats/fdd/fdd000460.shtml [Last accessed 19 March 2018].
  50. Lim, KW and Buntine, W. 2014. Twitter opinion topic model: Extracting product opinions from tweets by leveraging hashtags and sentiment lexicon. CIKM’14, November 3–7. [Last accessed 11 September 2017]. DOI: 10.1145/2661829.2662005
  51. Lima, JMT, Valle, D, Moretto, EM, Pulice, SMP, Zuca, NL, Roquetti, DR, Beduschi, LEC, Praia, AS, Okamoto, CPF, da Silva Carvalhaes, VL, Branco, EA, Barbezani, B, Labandera, E, Timpe, K and Kaplan, D. 2016. A social-ecological database to advance research on infrastructure development impacts in the Brazilian Amazon. Scientific Data (Nature), 3: Article number 160071. DOI: 10.1038/sdata.2016.71
  52. Lin, D and Wu, X. 2009. Phrase clustering for discriminative learning. Proceedings of the 47th Annual Meeting of the ACL and the 4th IJCNLP of the AFNLP, 10301038, 2–7 August. Suntec, Singapore. DOI: 10.3115/1690219.1690290
  53. Liu, Z, Jiang, Z, Fang, H, Li, C and Meng, Z. 2015. “Consumer Behavior” change we believe in: Demanding reduction strategy for endangered wildlife. Journal of Biodiversity and Endangered Species, 3(1). [Last accessed 11 September 2017]. DOI: 10.4172/2332-2543.1000141
  54. LTER. 2017. Welcome to the LTER network data portal. Long Term Ecological Research. Available at: https://portal.lternet.edu/nis/home.jsp [Last accessed 3 April 2018].
  55. Martinez, J and McLaughlin, MK. 2017. The best video conferencing software of 2017. PC Magazine, August 30. Available at: https://www.pcmag.com/article2/0,2817,2388678,00.asp [Last accessed 19 March 2018].
  56. Maurer, R. 2016. Is continuous screening the future normal? Society for Human Resource Management, October 28. Available at: http://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/continuous-screening-posthire-future.aspx [Last accessed 11 September 2017].
  57. McCune, JM, Perrig, A and Reiter, MK. 2005. Seeing-is-believing: Using camera phones for human-verifiable authentication. Proceedings of the 2005 IEEE Symposium on Security and Privacy. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1425062 [Last accessed 17 March 2018].
  58. Michener, WK. 2015. Ecological data sharing. Ecological Informatics, 29: 3344. DOI: 10.1016/j.ecoinf.2015.06.010
  59. Mier, KL and Picquelle, SJ. 2008. Estimating abundance of spatially aggregated populations: Comparing adaptive sampling with other survey designs. Canadian Journal of Fisheries and Aquatics, 65: 176197. DOI: 10.1139/f07-138
  60. Morgan, TJH, Uomini, NT, Rendell, LE, Chouinard-Thuly, L, Street, SE, Lewis, HM, Cross, CP and Evans, C, Kearney, R, de la Torre, I, Whiten, A and Laland, KN. 2015. Experimental evidence for the co-evolution of hominin tool-making teaching and language. Nature Communications, 6, Article number: 6029. DOI: 10.1038/ncomms7029
  61. Neslen, A. 2016. Poachers using science papers to target newly discovered species. The Guardian. Available at: https://www.theguardian.com/environment/2016/jan/01/poachers-using-science-papers-to-target-newly-discovered-species [Last access 26 May 2018].
  62. Newman, G, Chandler, M, Clyde, M, McGreavy, B, Haklay, M, Ballard, H, Gray, S, Scarpino, R, Hauptfeld, R, Mellor, D and Gallo, J. 2017. Leveraging the power of place in citizen science for effective conservation decision making. Biological Conservation, 208: 5564. DOI: 10.1016/j.biocon.2016.07.019
  63. Nuno, A and St. John, FAV. 2015. How to ask sensitive questions in conservation: A review of specialized questioning techniques. Biological Conservation, 189: 515.
  64. Oishi, Y and Matsunaga, T. 2014. Support system for surveying moving wild Animals in the snow using aerial remote-sensing images. International Journal of Remote Sensing, 35(4): 13741394. DOI: 10.1080/01431161.2013.876516
  65. Orman, H. 2015. Chapter 3: How does secure email work? In: Encrypted Email, 100. New York: Springer-Verlag.
  66. Panahbehagh, B. 2016. Adaptive rectangular sampling: An easy, incomplete, neighbourhood-free adaptive cluster sampling design. Survey Methodology, 42(2): 263281.
  67. Park, H and Jun, C. 2009. A simple and fast algorithm for K-medoids clustering. Expert Systems with Applications, 36: 33363341. DOI: 10.1016/j.eswa.2008.01.039
  68. Perinchery, A. 2017. Tigers, tarantuals and the online hunter. The Hindu, July 23. Available at: http://www.thehindu.com/sci-tech/energy-and-environment/tigers-tarantulas-and-the-online-hunter/article19325605.ece [Last accessed 19 March 2018].
  69. Piskorski, J and Yangarber, R. 2013. Information extraction: Past, present, and future. In: Poibeau, T, et al. (eds.), Multi-source, Multilingual Information Extraction and Summarization 11, Theory and Applications of Natural Language Processing. Berlin: Springer-Verlag. DOI: 10.1007/978-3-642-28569-1_2
  70. Presence, C. 2016. Lie detector tests for KNP rangers. IOL, January 29. Available at: http://www.iol.co.za/news/crime-courts/lie-detector-tests-for-knp-rangers-1977531 [Last accessed 11 September 2017].
  71. Purpura, PP. 2013. Security and Loss Prevention: An Introduction, Sixth Edition. Waltham, MA: Butterworth-Heinemann.
  72. Reverso. 2017. Irregular Verbs. Available at: http://conjugator.reverso.net/conjugation-irregular-ver [Last accessed 11 September 2017].
  73. Richardson, D. 2016. WorldView-4 Set to Launch After Months Long Delay. Available at: http://www.spaceflightinsider.com/organizations/ula/worldview-4-set-to-launch-after-months-long-delay/ [Last accessed 11 September 2017].
  74. Rissman, AR and Gillon, S. 2017. Where are ecology and biodiversity in social-ecological systems research? A review of research methods and applied recommendations. Conservation Letters, 10(1): 8693. DOI: 10.1111/conl.12250
  75. Rist, L, Felton, A, Mårald, E, Samuelsson, L, Lundmark, T and Rosvall, O. 2016. Avoiding the pitfalls of adaptive management implementation in Swedish silviculture. Ambio, 45(Suppl. 2): S140S151. DOI: 10.1007/s13280-015-0750-9
  76. Ryan, GW and Bernard, HR. 2003. Techniques to identify themes. Field Methods, 15(1): 85109. DOI: 10.1177/1525822X02239569
  77. Scheele, B and Lindenmayer, D. 2017. Scientists are accidentally helping poachers drive rare species to extinction. THE CONVERSATION, May 25. Available at: https://theconversation.com/scientists-are-accidentally-helping-poachers-drive-rare-species-to-extinction-78342 [Last accessed 19 March 2018].
  78. Schrodt, PA and Van Brackle, D. 2013. Automated coding of political event data. Handbook of Computational Approaches to Counterterrorism, Subrahmanian, VS (ed.), 2349. New York: Springer. DOI: 10.1007/978-1-4614-5311-6_2
  79. SDZSP. 2017. Elephant Valley. Available at: http://sdzsafaripark.org/park-locations/elephan-valley [Last accessed 11 September 2017].
  80. Shrader, AM and Owen-Smith, N. 2002. The role of companionship in the dispersal of white rhinoceroses (Ceratotherium simum). Behavioral Ecology and Sociobiology, 52(3): 255261. DOI: 10.1007/s00265-002-0506-y
  81. TalkEnglish. 2017. Top 500 Adjectives. Available at: http://www.talkenglish.com/vocabulary/top-500-adjectives.aspx [Last accessed 11 September 2017].
  82. Terletzky, P and Ramsey, RD. 2014. A semi-automated single day image differencing technique to identify animals in aerial imagery. PLoS ONE, 9(1): d85239. DOI: 10.1371/journal.pone.0085239
  83. TerraServer. 2017. Image Downloads. Available at: www.terraserver.com/products [Last accessed 11 September 2017].
  84. TheAnimalFiles. 2014. African Elephant. Available at: http://www.theanimalfiles.com/mammals/elephants/african_elephant.html [Last accessed 11 September 2017].
  85. Truong, VD, Dang, NVH and Hall, CM. 2016. “The marketplace management of illegal elixirs: Illicit consumption of rhin horn.” Consumption Markets and Culture, 19(4): 353369. DOI: 10.1080/10253866.2015.1108915
  86. Tu, T, Huang, PS, Hung, C and Chang, C. 2004. A fast intensity-hue-saturation fusion technique with spectral adjustment for IKONOS imagery. IEEE Geoscience and Remote Sensing Letters, 1(4): 309312. DOI: 10.1109/LGRS.2004.834804
  87. Uitto, JI. 2016. Evaluating the environment as a global public good. Evolution, 22(1): 108115. DOI: 10.1177/1356389015623135
  88. United States. 2016. Demand reduction strategies to combat illegal trade in CITES-listed species. Convention on International Trade in Endangered Species of Wild Fauna and Flora, CoP17 Doc. 18.1.
  89. United States National Science Foundation. 2014. Earth to Data: Making Sense of Environmental Observations, 14135. News Release. Available at: www.nsf.gov/news/news_summ.jsp?cntn_id=132973 [Last accessed 5 April 2018].
  90. Vasani, KA. 2014. Content evocation using web scraping and semantic illustration. IOSR Journal of Computer Engineering, 16(3): 5460. Ver. IX (May–June). DOI: 10.9790/0661-16395460
  91. Virapongse, A, Brooks, S, Metcalf, EC, Zedalis, M, Gosz, J, Klisky, A and Alessa, L. 2016. A social-ecological systems approach for environmental management. Journal of Environmental Management, 178: 8391. DOI: 10.1016/j.jenvman.2016.02.028
  92. Wang, S, Li, X, Ge, Y, Jin, R, Ma, M, Liu, Q, Wen, J and Liu, S. 2016. Validation of regional-scale remote sensing products in China: From site to network. Remote Sensing, 8(980). DOI: 10.3390/rs8120980
  93. Warner, KE. 1977. The effects of the anti-smoking campaign on cigarette consumption. American Journal of Public Health, 67(7): 645650. DOI: 10.2105/AJPH.67.7.645
  94. Welz, A. 2017. Unnatural surveillance: How online data is putting species at risk. Yale Environment 360. Available at: https://e360.yale.edu/features/unnatural-surveillance-how-online-data-is-putting-species-at-risk [Last accessed 26 May 2018].
  95. Wernick, A. 2017. Online location data on endangered species might be putting them in harm’s way. Public Radio International, October 15. Available at: https://www.pri.org/stories/2017-10-15/online-location-data-endangered-species-might-be-putting-them-harm-s-way [Last accessed 19 March 2018].
  96. Yang, Z, Wang, T, Sidmore, AK, de Leeuw, J, Said, MY and Freer, J. 2014. Spotting East African mammals in open savannah from space. PLoS ONE, 9(12): e115989. DOI: 10.1371/journal.pone.0115989
  97. Yujian, L and Bo, L. 2007. A normalized Levenshtein distance metric. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6): 10911095. June. DOI: 10.1109/TPAMI.2007.1078
  98. Zandbergen, PA. 2014. Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual-level data. Advances in Medicine. [Last accessed 5 April 2018]. DOI: 10.1155/2014/567049
  99. Zapf, A, Castell, S, Morawietz, L and Karch, A. 2016. Measuring inter-rater reliability for nominal data – which coefficients and confidence intervals are appropriate? BMC Medical Research Methodology, 16(93). DOI: 10.1186/s12874-016-0200-9
Language: English
Submitted on: Sep 11, 2017
|
Accepted on: Jun 8, 2018
|
Published on: Jul 3, 2018
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2018 Timothy C. Haas, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.