Appropriate uses of EICAT protocol, data and classifications
Main Authors: | Kumschick, Sabrina, Bacher, Sven, Bertolino, Sandro, Blackburn, Tim M., Evans, Thomas, Roy, Helen E., Smith, Kevin |
---|---|
Format: | Article eJournal |
Terbitan: |
Pensoft Publishers
, 2020
|
Subjects: | |
Online Access: |
https://zenodo.org/record/4119399 |
ctrlnum |
4119399 |
---|---|
fullrecord |
<?xml version="1.0"?>
<dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><creator>Kumschick, Sabrina</creator><creator>Bacher, Sven</creator><creator>Bertolino, Sandro</creator><creator>Blackburn, Tim M.</creator><creator>Evans, Thomas</creator><creator>Roy, Helen E.</creator><creator>Smith, Kevin</creator><date>2020-10-15</date><description>The Environmental Impact Classification for Alien Taxa (EICAT) can be used to classify alien taxa according to the magnitude and type of their environmental impacts. The EICAT protocol, classifications of alien taxa using the protocol (EICAT classification) and the data underpinning classifications (EICAT data) are increasingly used by scientists and practitioners such as governments, NGOs and civil society for a variety of purposes. However, the properties of the EICAT protocol and the data it generates are not suitable for certain uses. Therefore, we present guidelines designed to clarify and facilitate the appropriate use of EICAT to tackle a broad range of conservation issues related to biological invasions, as well as to guide research and communication more generally. Here we address common misconceptions and give a brief overview of some key issues that all EICAT users need to be aware of to take maximal advantage of this resource. Furthermore, we give examples of the wide variety of ways in which the EICAT protocol, classifications and data can be and have been utilised and outline common errors and pitfalls to avoid.</description><identifier>https://zenodo.org/record/4119399</identifier><identifier>10.3897/neobiota.62.51574</identifier><identifier>oai:zenodo.org:4119399</identifier><publisher>Pensoft Publishers</publisher><relation>url:https://zenodo.org/communities/biosyslit</relation><rights>info:eu-repo/semantics/openAccess</rights><rights>https://creativecommons.org/licenses/by/4.0/legalcode</rights><source>NeoBiota 62 193-212</source><subject>Biological invasions Environmental Impact Classification for Alien Taxa management policy-making prioritisation</subject><title>Appropriate uses of EICAT protocol, data and classifications</title><type>Journal:Article</type><type>Journal:Article</type><recordID>4119399</recordID></dc>
|
format |
Journal:Article Journal Journal:eJournal |
author |
Kumschick, Sabrina Bacher, Sven Bertolino, Sandro Blackburn, Tim M. Evans, Thomas Roy, Helen E. Smith, Kevin |
title |
Appropriate uses of EICAT protocol, data and classifications |
publisher |
Pensoft Publishers |
publishDate |
2020 |
topic |
Biological invasions Environmental Impact Classification for Alien Taxa management policy-making prioritisation |
url |
https://zenodo.org/record/4119399 |
contents |
The Environmental Impact Classification for Alien Taxa (EICAT) can be used to classify alien taxa according to the magnitude and type of their environmental impacts. The EICAT protocol, classifications of alien taxa using the protocol (EICAT classification) and the data underpinning classifications (EICAT data) are increasingly used by scientists and practitioners such as governments, NGOs and civil society for a variety of purposes. However, the properties of the EICAT protocol and the data it generates are not suitable for certain uses. Therefore, we present guidelines designed to clarify and facilitate the appropriate use of EICAT to tackle a broad range of conservation issues related to biological invasions, as well as to guide research and communication more generally. Here we address common misconceptions and give a brief overview of some key issues that all EICAT users need to be aware of to take maximal advantage of this resource. Furthermore, we give examples of the wide variety of ways in which the EICAT protocol, classifications and data can be and have been utilised and outline common errors and pitfalls to avoid. |
id |
IOS17403.4119399 |
institution |
Universitas PGRI Palembang |
institution_id |
189 |
institution_type |
library:university library |
library |
Perpustakaan Universitas PGRI Palembang |
library_id |
587 |
collection |
Marga Life in South Sumatra in the Past: Puyang Concept Sacrificed and Demythosized |
repository_id |
17403 |
city |
KOTA PALEMBANG |
province |
SUMATERA SELATAN |
repoId |
IOS17403 |
first_indexed |
2022-07-26T01:55:20Z |
last_indexed |
2022-07-26T01:55:20Z |
recordtype |
dc |
_version_ |
1739407243483283456 |
score |
17.610468 |