4.5 Article

Appropriate uses of EICAT protocol, data and classifications

期刊

NEOBIOTA
卷 -, 期 62, 页码 193-212

出版社

PENSOFT PUBLISHERS
DOI: 10.3897/neobiota.62.51574

关键词

Biological invasions; Environmental Impact Classification for Alien Taxa; management; policy-making; prioritisation

资金

  1. National Research Foundation of South Africa
  2. Stellenbosch University
  3. DSI-NRF Centre of Excellence for Invasion Biology (CIB)
  4. South African Department of Environment, Forestry and Fisheries (DEFF)
  5. Natural Environment Research Council as part of the UK-SCAPE programme delivering National Capability [NE/R016429/1]
  6. Alexander von Humboldt Foundation
  7. Swiss National Science Foundation [31003A_179491, 31BD30_184114]
  8. Belmont Forum -BiodivERsA International joint call project InvasiBES [PCI2018-092939]
  9. Swiss National Science Foundation (SNF) [31003A_179491, 31BD30_184114] Funding Source: Swiss National Science Foundation (SNF)

向作者/读者索取更多资源

The Environmental Impact Classification for Alien Taxa (EICAT) can be used to classify alien taxa according to the magnitude and type of their environmental impacts. The EICAT protocol, classifications of alien taxa using the protocol (EICAT classification) and the data underpinning classifications (EICAT data) are increasingly used by scientists and practitioners such as governments, NGOs and civil society for a variety of purposes. However, the properties of the EICAT protocol and the data it generates are not suitable for certain uses. Therefore, we present guidelines designed to clarify and facilitate the appropriate use of EICAT to tackle a broad range of conservation issues related to biological invasions, as well as to guide research and communication more generally. Here we address common misconceptions and give a brief overview of some key issues that all EICAT users need to be aware of to take maximal advantage of this resource. Furthermore, we give examples of the wide variety of ways in which the EICAT protocol, classifications and data can be and have been utilised and outline common errors and pitfalls to avoid.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据