Skip to main content
WCS
Menu
Library
Library Catalog
eJournals & eBooks
WCS Research
Archives
Research Use
Finding Aids
Digital Collections
WCS History
WCS Research
Research Publications
Science Data
Services for WCS Researchers
Archives Shop
Bronx Zoo
Department of Tropical Research
Browse By Product
About Us
FAQs
Intern or Volunteer
Staff
Donate
Search WCS.org
Search
search
Popular Search Terms
WCS History
Library and Archives
Library and Archives Menu
Library
Archives
WCS Research
Archives Shop
About Us
Donate
en
fr
Title
Why do we map threats? Linking threat mapping with actions to make better conservation decisions
Author(s)
Tulloch, V.J.D.;Tulloch, A.I.T.;Visconti, P.;Halpern, B.S.;Watson, J.E.M.;Evans, M.C.;Auerbach, N.A.;Barnes, M.;Beger, M.;Chadès, I.;Giakoumi, S.;McDonald-Madden, E.;Murray, N.J.;Ringma, J.;Possingham, H.P.
Published
2015
Publisher
Frontiers in Ecology and the Environment
Published Version DOI
https://doi.org/10.1890/140022
Abstract
Spatial representations of threatening processes ? ?threat maps? ? can identify where biodiversity is at risk, and are often used to identify priority locations for conservation. In doing so, decision makers are prone to making errors, either by assuming that the level of threat dictates spatial priorities for action or by relying primarily on the location of mapped threats to choose possible actions. We show that threat mapping can be a useful tool when incorporated within a transparent and repeatable structured decision-making (SDM) process. SDM ensures transparent and defendable conservation decisions by linking objectives to biodiversity outcomes, and by considering constraints, consequences of actions, and uncertainty. If used to make conservation decisions, threat maps are best developed with an understanding of how species respond to actions that mitigate threats. This approach will ensure that conservation actions are prioritized where they are most cost-effective or have the greatest impact, rather than where threat levels are highest.
Access Full Text
A full-text copy of this article may be available. Please email the
WCS Library
to request.
Back
PUB15747