References
- Aarts, B. 2011. Oxford Modern English Grammar, 448. Oxford: Oxford University Press.
- Allen, AM and Singh, NJ. 2016. “Linking movement ecology with wildlife management and conservation.” Frontiers in Ecology and Evolution, 3. DOI: 10.3389/fevo.2015.00155
- American Society for Indexing. 2018. Taxonomies & Controlled Vocabularies Special Interest Group. Available at:
www.taxonomies-sig.org/about.htm [Last accessed 7 April 2018]. - Anwar, S, Zain, JM, Zolkipli, MF, Inayat, Z, Khan, S, Anthony, B and Chang, V. 2017. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. algorithms, 10(39). DOI: 10.3390/a10020039
- Blei, DM and Smyth, P. 2017. Science and data science. Proceedings of the National Academy of Sciences of the United States of America, 114(33): 8689–6892. DOI: 10.1073/pnas.1702076114
- Bodin, Ö, Crona, B, Thyresson, M, Golz, A-L and Tengö, M. 2014. Conservation success as a function of good alignment of social and ecological structures and processes. Conservation Biology, 28: 1371–1379. DOI: 10.1111/cobi.12306
- Braungart, M, McDonough, W and Bollinger, A. 2007. Cradle-to-cradle design: Creating healthy emissions – a strategy for eco-effective product and system design. Journal of Cleaner Production, 15: 1337–1348. DOI: 10.1016/j.jclepro.2006.08.003
- British Council. 2017. Multi-word Verbs. Available at:
https://learnenglish.britishcouncil.org/en/quick-grammar/multi-word-verbs [Last accessed 11 September 2017]. - Brombal, D. 2017. Accuracy of environmental monitoring in China: Exploring the influence of institutional, political and ideological factors. Sustainability, 9(324). DOI: 10.3390/su9030324
- Ceballos, G, Ehrlich, PR, Barnosky, AD, García, A, Pringle, RM and Palmer, TM. 2015. Accelerated modern human-induced species losses: Entering the sixth mass extinction. Science Advances, 1(5):
e1400253 . DOI: 10.1126/sciadv.1400253 - Cedar Creek. 2018. Data use policies. Cedar Creek Ecosystem Science Reserve. Available at:
https://www.cedarcreek.umn.edu/research/datadatause [Last accessed 3 April 2018]. - Cordeiro, J, Dias, G and Brazdil, P. 2007. A Metric for paraphrase detection. Proceedings of the International Multi-Conference on Computing in the Global Information Technology.
IEEE Computer Society . Available at:http://ieeexplore.ieee.org/document/4137062/ [Last accessed 11 September 2017]. - Daelemans, W, Buchholz, S and Veenstra, J. 1999. Memory-based shallow parsing. In: Proceedings of the EACL’99 workshop on Computational Natural Language Learning (CoNLL-99), 53–60. Bergen, Norway.
- Davies, DL and Bouldin, DW. 1979. A cluster separation measure. IEEE Transactions on Pattern Analysis and Machine Intelligence, PAMI-1(2): 224–227. DOI: 10.1109/TPAMI.1979.4766909
- defenceWeb. 2017. A ranger’s view on rhino poaching. defenceWeb, July 11. Available at:
http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=48522 [Last accessed 11 September 2017]. - de la Hoz, E, Paez-Reyes, R, Cochrane, G, Marsa-Maestre, I, Moreira-Lemus, JM and Alarcos, B. 2014. Detecting and defeating advanced man-in-the-middle attacks against TLS. 6th International Conference on Cyber Conflict, Brangetto, P, Maybaum, M and Stinissen, J (eds.). Available at:
http://www.ccdcoe.org/cycon/2014/proceedings/d2r2s2_delahoz.pdf [Last accessed 17 March 2018]. - de Weerd, N, van Langevelde, F, van Oeveren, H, Nolet, BA, Kölzsch, A, Prins, HHT and de Boer, WF. 2015. Deriving animal behaviour from high-frequency GPS: Tracking cows in open and forested habitat. PLoS ONE, 10(6):
e0129030 . [Last accessed 4 April 2018]. DOI: 10.1371/journal.pone.0129030 - EnglishClub. 2017. Regular Verbs List. Available at:
www.englishclub.com/vocabulary/regular-verbs-list.htm [Last accessed 11 September 2017]. - Farnsworth, E. 2005. Guidelines for Ethical Field Research on Rare Plant Species. New England Wild Flower Society, January. Available at:
http://www.mass.gov/eea/docs/dfg/nhesp/regulatory-review/nepcopresearchguide.pdf [Last accessed 11 September 2017]. - Ferguson, CC. 1992. The statistical basis for spatial sampling of contaminated land. Ground Engineering, 34–38. June.
- Francis, RA, Taylor, JD, Dibble, E, Strickland, B, Petro, VM, Easterwood, C and Wang, G. 2017. Restricted cross-scale habitat selection by American beavers. Current Zoology, 63(6): 703–710. DOI: 10.1093/cz/zox059
- Frey, UJ and Cox, M. 2015. Building a diagnostic ontology of social-ecological systems. International Journal of the Commons, 9(2): 595–618. DOI: 10.18352/ijc.505
- Gammon Ranges. 2017. Gammon Ranges (Nature Conservation Society) Survey. Data Discovery Portal, Terrestrial Ecosystem Research Network (TERN), The University of Queensland, Australia. Available at:
http://portal.tern.org.au/#/4fb352b1 [Last accessed 2 April 2018]. - Gazzola, M. 2014. The Evaluation of Language Regimes, 375. Amsterdam: John Benjamins Publishing Company.
- GDAL. 2017. gdal translate. Available at:
www.gdal.org/gdal_translate.html [Last accessed 9 September 2017]. - GMU. 2017. Classified Information and Personnel Security Clearances: University Policy Number 1119. University Policy, George Mason University. Available at:
https://universitypolicy.gmu.edu/policies/classified-information-and-personnel-security-clearances/ [Last accessed 11 September 2017]. - Guinote, A. 2017. How power affects people: Activating, wanting, and goal seeking. Annual Review of Psychology, 68: 353–381. DOI: 10.1146/annurev-psych-010416-044153
- Haas, TC. 2001. A web-based system for public-private sector collaborative ecosystem management. Stochastic Environmental Research and Risk Assessment, 15: 101–131. DOI: 10.1007/s004770000062
- Haas, TC. 2011. Improving Natural Resource Management: Ecological and Political Models. Wiley-Blackwell, Chichester, U.K. DOI: 10.1002/9780470979334
- Haas, TC. 2018. Rhino Ecosystem Management Tool, online resource. Available at:
www4.uwm.edu/people/haas/rhino_emt [Last accessed 21 March 2018]. - Haas, TC and Ferreira, SM. 2015. Federated databases and actionable intelligence: Using social network analysis to disrupt transnational wildlife trafficking criminal networks. Security Informatics, 4(1). DOI: 10.1186/s13388-015-0018-8
- Haas, TC and Ferreira, SM. 2016a. Conservation risks: When will rhinos be extinct? IEEE Transactions on Cybernetics, 46(8): 1721–1724. DOI: 10.1109/TCYB.2015.2470520
- Haas, TC and Ferreira, SM. 2016b. Combating rhino horn trafficking: The need to disrupt criminal networks. PLoS ONE, 11(11):
e0167040 . DOI: 10.1371/journal.pone.0167040 - Haas, TC and Ferreira, SM. 2018. Finding politically feasible conservation strategies: The case of wildlife trafficking. Ecological Applications, 28(20): 473–494. DOI: 10.1002/eap.1662
- Hansman, S and Hut, R. 2005. A taxonomy of network and computer attacks. Computers & Security, 24: 31–43. DOI: 10.1016/j.cose.2004.06.011
- Hedley, J. 2017. jsoup: Java HTML Parser. Available at:
https://jsoup.org [Last accessed 11 September 2017]. - Hoff, E. 2003.
Chapter 7: Language development in childhood . In: Handbook of Psychology, Vol. 6: Developmental Psychology, Lerner, RM, Easterbrooks, MA and Mistry, J (eds.). Hoboken, NJ: John Wiley and Sons. DOI: 10.1002/0471264385.wei0607 - Ignatow, G and Mihalcea, R. 2018. An Introduction to Text Mining, 310. Los Angeles: Sage Publications.
- Khimm, S. 2016. China’s gold rush in the hills of Appalachia. Foreign Policy, September 7. Available at:
http://foreignpolicy.com/2016/09/07/the-thrill-of-the-hunt-ginseng-smuggling-poaching-boone-north-carolina-china/ [Last accessed 11 September 2017]. - Koh, LP. 2015. Poachers expected to use green drones to kill endangered wildlife. Ecological Society of Australia.
https://www.ecolsoc.org.au/poachers-expected-use-green-drones-kill-endangered-wildlife [Last accessed 26 May 2018]. - Köhler, M, Lukić, I and Čik, VK. 2017. Protecting information with subcodstanography. Security and Communication Networks, 13. Article ID
9130683 . DOI: 10.1155/2017/9130683 [Last accessed 15 March 2018]. - Kranacher, M, Riley, RA,
Jr. and Wells, JT. 2011. Forensic Accounting and Fraud Examination. New York: Wiley. - Laurila-Pant, M, Lehikoinen, A, Uusitalo, L and Venesjärvi, R. 2015. How to value biodiversity in environmental management? Ecological Indicators, 55: 1–11. DOI: 10.1016/j.ecolind.2015.02.034
- Legalbrief. 2017. Government slated for withholding rhino poaching data. Legalbrief, May 24. Available at:
legalbrief.co.za/diary/legalbrief-environmental/story/…withholding…poaching…/pdf/ [Last accessed 11 September 2017]. - Leng, RJ. 1999. Behavioral Correlates of War, 1816–1979 (Computer File), 3rd Release, Middlebury College, Middlebury, VT, 1993, Study Number 8606 from the Inter-University Consortium for Political and Social Research (ICPSR), Ann Arbor, Michigan, USA. Available at:
www.icpsr.umich.edu [Last accessed 12 January 2010]. - Leng, RJ and Singer, JD. 1988. Militarized interstate crises: The BCOW typology and its applications. International Studies Quarterly, 32: 155–173. DOI: 10.2307/2600625
- Lenzen, M, Moran, D, Kanemoto, K, Foran, B, Lobefaro, L and Geschke, A. 2012. International trade drives biodiversity threats in developing nations. Nature, 486: 109–112. June 7.
- Levenshtein, A. 1966. Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady, 10(8): 707–710.
- Library of Congress. 2017. RAR Archive Fiel Format, Version 5. Available at:
https://www.loc.gov/preservation/digital/formats/fdd/fdd000460.shtml [Last accessed 19 March 2018]. - Lim, KW and Buntine, W. 2014. Twitter opinion topic model: Extracting product opinions from tweets by leveraging hashtags and sentiment lexicon. CIKM’14, November 3–7. [Last accessed 11 September 2017]. DOI: 10.1145/2661829.2662005
- Lima, JMT, Valle, D, Moretto, EM, Pulice, SMP, Zuca, NL, Roquetti, DR, Beduschi, LEC, Praia, AS, Okamoto, CPF, da Silva Carvalhaes, VL, Branco, EA, Barbezani, B, Labandera, E, Timpe, K and Kaplan, D. 2016. A social-ecological database to advance research on infrastructure development impacts in the Brazilian Amazon. Scientific Data (Nature), 3: Article number 160071. DOI: 10.1038/sdata.2016.71
- Lin, D and Wu, X. 2009. Phrase clustering for discriminative learning. Proceedings of the 47th Annual Meeting of the ACL and the 4th IJCNLP of the AFNLP, 1030–1038,
2–7 August .Suntec , Singapore. DOI: 10.3115/1690219.1690290 - Liu, Z, Jiang, Z, Fang, H, Li, C and Meng, Z. 2015. “Consumer Behavior” change we believe in: Demanding reduction strategy for endangered wildlife. Journal of Biodiversity and Endangered Species, 3(1). [Last accessed 11 September 2017]. DOI: 10.4172/2332-2543.1000141
- LTER. 2017. Welcome to the LTER network data portal. Long Term Ecological Research. Available at:
https://portal.lternet.edu/nis/home.jsp [Last accessed 3 April 2018]. - Martinez, J and McLaughlin, MK. 2017. The best video conferencing software of 2017. PC Magazine, August 30. Available at:
https://www.pcmag.com/article2/0,2817,2388678,00.asp [Last accessed 19 March 2018]. - Maurer, R. 2016. Is continuous screening the future normal? Society for Human Resource Management, October 28. Available at:
http://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/continuous-screening-posthire-future.aspx [Last accessed 11 September 2017]. - McCune, JM, Perrig, A and Reiter, MK. 2005. Seeing-is-believing: Using camera phones for human-verifiable authentication. Proceedings of the 2005 IEEE Symposium on Security and Privacy. Available at:
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1425062 [Last accessed 17 March 2018]. - Michener, WK. 2015. Ecological data sharing. Ecological Informatics, 29: 33–44. DOI: 10.1016/j.ecoinf.2015.06.010
- Mier, KL and Picquelle, SJ. 2008. Estimating abundance of spatially aggregated populations: Comparing adaptive sampling with other survey designs. Canadian Journal of Fisheries and Aquatics, 65: 176–197. DOI: 10.1139/f07-138
- Morgan, TJH, Uomini, NT, Rendell, LE, Chouinard-Thuly, L, Street, SE, Lewis, HM, Cross, CP and Evans, C, Kearney, R, de la Torre, I, Whiten, A and Laland, KN. 2015. Experimental evidence for the co-evolution of hominin tool-making teaching and language. Nature Communications, 6, Article number: 6029. DOI: 10.1038/ncomms7029
- Neslen, A. 2016. Poachers using science papers to target newly discovered species. The Guardian. Available at:
https://www.theguardian.com/environment/2016/jan/01/poachers-using-science-papers-to-target-newly-discovered-species [Last access 26 May 2018]. - Newman, G, Chandler, M, Clyde, M, McGreavy, B, Haklay, M, Ballard, H, Gray, S, Scarpino, R, Hauptfeld, R, Mellor, D and Gallo, J. 2017. Leveraging the power of place in citizen science for effective conservation decision making. Biological Conservation, 208: 55–64. DOI: 10.1016/j.biocon.2016.07.019
- Nuno, A and St. John, FAV. 2015. How to ask sensitive questions in conservation: A review of specialized questioning techniques. Biological Conservation, 189: 5–15.
- Oishi, Y and Matsunaga, T. 2014. Support system for surveying moving wild Animals in the snow using aerial remote-sensing images. International Journal of Remote Sensing, 35(4): 1374–1394. DOI: 10.1080/01431161.2013.876516
- Orman, H. 2015.
Chapter 3: How does secure email work? In: Encrypted Email, 100. New York: Springer-Verlag. - Panahbehagh, B. 2016. Adaptive rectangular sampling: An easy, incomplete, neighbourhood-free adaptive cluster sampling design. Survey Methodology, 42(2): 263–281.
- Park, H and Jun, C. 2009. A simple and fast algorithm for K-medoids clustering. Expert Systems with Applications, 36: 3336–3341. DOI: 10.1016/j.eswa.2008.01.039
- Perinchery, A. 2017. Tigers, tarantuals and the online hunter. The Hindu, July 23. Available at:
http://www.thehindu.com/sci-tech/energy-and-environment/tigers-tarantulas-and-the-online-hunter/article19325605.ece [Last accessed 19 March 2018]. - Piskorski, J and Yangarber, R. 2013.
Information extraction: Past, present, and future . In: Poibeau, T, et al. (eds.), Multi-source, Multilingual Information Extraction and Summarization 11, Theory and Applications of Natural Language Processing. Berlin: Springer-Verlag. DOI: 10.1007/978-3-642-28569-1_2 - Presence, C. 2016. Lie detector tests for KNP rangers. IOL, January 29. Available at:
http://www.iol.co.za/news/crime-courts/lie-detector-tests-for-knp-rangers-1977531 [Last accessed 11 September 2017]. - Purpura, PP. 2013. Security and Loss Prevention: An Introduction, Sixth Edition. Waltham, MA: Butterworth-Heinemann.
- Reverso. 2017. Irregular Verbs. Available at:
http://conjugator.reverso.net/conjugation-irregular-ver [Last accessed 11 September 2017]. - Richardson, D. 2016. WorldView-4 Set to Launch After Months Long Delay. Available at:
http://www.spaceflightinsider.com/organizations/ula/worldview-4-set-to-launch-after-months-long-delay/ [Last accessed 11 September 2017]. - Rissman, AR and Gillon, S. 2017. Where are ecology and biodiversity in social-ecological systems research? A review of research methods and applied recommendations. Conservation Letters, 10(1): 86–93. DOI: 10.1111/conl.12250
- Rist, L, Felton, A, Mårald, E, Samuelsson, L, Lundmark, T and Rosvall, O. 2016. Avoiding the pitfalls of adaptive management implementation in Swedish silviculture. Ambio, 45(Suppl. 2): S140–S151. DOI: 10.1007/s13280-015-0750-9
- Ryan, GW and Bernard, HR. 2003. Techniques to identify themes. Field Methods, 15(1): 85–109. DOI: 10.1177/1525822X02239569
- Scheele, B and Lindenmayer, D. 2017. Scientists are accidentally helping poachers drive rare species to extinction. THE CONVERSATION, May 25. Available at:
https://theconversation.com/scientists-are-accidentally-helping-poachers-drive-rare-species-to-extinction-78342 [Last accessed 19 March 2018]. - Schrodt, PA and Van Brackle, D. 2013.
Automated coding of political event data . Handbook of Computational Approaches to Counterterrorism, Subrahmanian, VS (ed.), 23–49. New York: Springer. DOI: 10.1007/978-1-4614-5311-6_2 - SDZSP. 2017. Elephant Valley. Available at:
http://sdzsafaripark.org/park-locations/elephan-valley [Last accessed 11 September 2017]. - Shrader, AM and Owen-Smith, N. 2002. The role of companionship in the dispersal of white rhinoceroses (Ceratotherium simum). Behavioral Ecology and Sociobiology, 52(3): 255–261. DOI: 10.1007/s00265-002-0506-y
- TalkEnglish. 2017. Top 500 Adjectives. Available at:
http://www.talkenglish.com/vocabulary/top-500-adjectives.aspx [Last accessed 11 September 2017]. - Terletzky, P and Ramsey, RD. 2014. A semi-automated single day image differencing technique to identify animals in aerial imagery. PLoS ONE, 9(1):
d85239 . DOI: 10.1371/journal.pone.0085239 - TerraServer. 2017. Image Downloads. Available at:
www.terraserver.com/products [Last accessed 11 September 2017]. - TheAnimalFiles. 2014. African Elephant. Available at:
http://www.theanimalfiles.com/mammals/elephants/african_elephant.html [Last accessed 11 September 2017]. - Truong, VD, Dang, NVH and Hall, CM. 2016. “The marketplace management of illegal elixirs: Illicit consumption of rhin horn.” Consumption Markets and Culture, 19(4): 353–369. DOI: 10.1080/10253866.2015.1108915
- Tu, T, Huang, PS, Hung, C and Chang, C. 2004. A fast intensity-hue-saturation fusion technique with spectral adjustment for IKONOS imagery. IEEE Geoscience and Remote Sensing Letters, 1(4): 309–312. DOI: 10.1109/LGRS.2004.834804
- Uitto, JI. 2016. Evaluating the environment as a global public good. Evolution, 22(1): 108–115. DOI: 10.1177/1356389015623135
- United States. 2016. Demand reduction strategies to combat illegal trade in CITES-listed species. Convention on International Trade in Endangered Species of Wild Fauna and Flora, CoP17 Doc. 18.1.
- United States National Science Foundation. 2014. Earth to Data: Making Sense of Environmental Observations, 14–135. News Release. Available at:
www.nsf.gov/news/news_summ.jsp?cntn_id=132973 [Last accessed 5 April 2018]. - Vasani, KA. 2014. Content evocation using web scraping and semantic illustration. IOSR Journal of Computer Engineering, 16(3): 54–60. Ver. IX (May–June). DOI: 10.9790/0661-16395460
- Virapongse, A, Brooks, S, Metcalf, EC, Zedalis, M, Gosz, J, Klisky, A and Alessa, L. 2016. A social-ecological systems approach for environmental management. Journal of Environmental Management, 178: 83–91. DOI: 10.1016/j.jenvman.2016.02.028
- Wang, S, Li, X, Ge, Y, Jin, R, Ma, M, Liu, Q, Wen, J and Liu, S. 2016. Validation of regional-scale remote sensing products in China: From site to network. Remote Sensing, 8(980). DOI: 10.3390/rs8120980
- Warner, KE. 1977. The effects of the anti-smoking campaign on cigarette consumption. American Journal of Public Health, 67(7): 645–650. DOI: 10.2105/AJPH.67.7.645
- Welz, A. 2017. Unnatural surveillance: How online data is putting species at risk. Yale Environment 360. Available at:
https://e360.yale.edu/features/unnatural-surveillance-how-online-data-is-putting-species-at-risk [Last accessed 26 May 2018]. - Wernick, A. 2017. Online location data on endangered species might be putting them in harm’s way. Public Radio International, October 15. Available at:
https://www.pri.org/stories/2017-10-15/online-location-data-endangered-species-might-be-putting-them-harm-s-way [Last accessed 19 March 2018]. - Yang, Z, Wang, T, Sidmore, AK, de Leeuw, J, Said, MY and Freer, J. 2014. Spotting East African mammals in open savannah from space. PLoS ONE, 9(12):
e115989 . DOI: 10.1371/journal.pone.0115989 - Yujian, L and Bo, L. 2007. A normalized Levenshtein distance metric. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6): 1091–1095. June. DOI: 10.1109/TPAMI.2007.1078
- Zandbergen, PA. 2014. Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual-level data. Advances in Medicine. [Last accessed 5 April 2018]. DOI: 10.1155/2014/567049
- Zapf, A, Castell, S, Morawietz, L and Karch, A. 2016. Measuring inter-rater reliability for nominal data – which coefficients and confidence intervals are appropriate? BMC Medical Research Methodology, 16(93). DOI: 10.1186/s12874-016-0200-9
