Allen, AM and Singh, NJ. 2016. “Linking movement ecology with wildlife management and conservation.” Frontiers in Ecology and Evolution, 3. DOI: https://doi.org/10.3389/fevo.2015.00155
American Society for Indexing. 2018. Taxonomies & Controlled Vocabularies Special Interest Group. Available at: www.taxonomies-sig.org/about.htm [Last accessed 7 April 2018].
Anwar, S, Zain, JM, Zolkipli, MF, Inayat, Z, Khan, S, Anthony, B and Chang, V. 2017. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. algorithms, 10(39). DOI: https://doi.org/10.3390/a10020039
Blei, DM and Smyth, P. 2017. Science and data science. Proceedings of the National Academy of Sciences of the United States of America, 114(33): 8689–6892. DOI: https://doi.org/10.1073/pnas.1702076114
Bodin, Ö, Crona, B, Thyresson, M, Golz, A-L and Tengö, M. 2014. Conservation success as a function of good alignment of social and ecological structures and processes. Conservation Biology, 28: 1371–1379. DOI: https://doi.org/10.1111/cobi.12306
Braungart, M, McDonough, W and Bollinger, A. 2007. Cradle-to-cradle design: Creating healthy emissions – a strategy for eco-effective product and system design. Journal of Cleaner Production, 15: 1337–1348. DOI: https://doi.org/10.1016/j.jclepro.2006.08.003
British Council. 2017. Multi-word Verbs. Available at: https://learnenglish.britishcouncil.org/en/quick-grammar/multi-word-verbs [Last accessed 11 September 2017].
Brombal, D. 2017. Accuracy of environmental monitoring in China: Exploring the influence of institutional, political and ideological factors. Sustainability, 9(324). DOI: https://doi.org/10.3390/su9030324
Ceballos, G, Ehrlich, PR, Barnosky, AD, García, A, Pringle, RM and Palmer, TM. 2015. Accelerated modern human-induced species losses: Entering the sixth mass extinction. Science Advances, 1(5): e1400253. DOI: https://doi.org/10.1126/sciadv.1400253
Cedar Creek. 2018. Data use policies. Cedar Creek Ecosystem Science Reserve. Available at: https://www.cedarcreek.umn.edu/research/datadatause [Last accessed 3 April 2018].
Cordeiro, J, Dias, G and Brazdil, P. 2007. A Metric for paraphrase detection. Proceedings of the International Multi-Conference on Computing in the Global Information Technology. IEEE Computer Society. Available at: http://ieeexplore.ieee.org/document/4137062/ [Last accessed 11 September 2017].
Davies, DL and Bouldin, DW. 1979. A cluster separation measure. IEEE Transactions on Pattern Analysis and Machine Intelligence, PAMI-1(2): 224–227. DOI: https://doi.org/10.1109/TPAMI.1979.4766909
defenceWeb. 2017. A ranger’s view on rhino poaching. defenceWeb, July 11. Available at: http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=48522 [Last accessed 11 September 2017].
de la Hoz, E, Paez-Reyes, R, Cochrane, G, Marsa-Maestre, I, Moreira-Lemus, JM and Alarcos, B. 2014. Detecting and defeating advanced man-in-the-middle attacks against TLS. 6th International Conference on Cyber Conflict, Brangetto, P, Maybaum, M and Stinissen, J (eds.). Available at: http://www.ccdcoe.org/cycon/2014/proceedings/d2r2s2_delahoz.pdf [Last accessed 17 March 2018].
de Weerd, N, van Langevelde, F, van Oeveren, H, Nolet, BA, Kölzsch, A, Prins, HHT and de Boer, WF. 2015. Deriving animal behaviour from high-frequency GPS: Tracking cows in open and forested habitat. PLoS ONE, 10(6): e0129030. [Last accessed 4 April 2018]. DOI: https://doi.org/10.1371/journal.pone.0129030
EnglishClub. 2017. Regular Verbs List. Available at: www.englishclub.com/vocabulary/regular-verbs-list.htm [Last accessed 11 September 2017].
Farnsworth, E. 2005. Guidelines for Ethical Field Research on Rare Plant Species. New England Wild Flower Society, January. Available at: http://www.mass.gov/eea/docs/dfg/nhesp/regulatory-review/nepcopresearchguide.pdf [Last accessed 11 September 2017].
Francis, RA, Taylor, JD, Dibble, E, Strickland, B, Petro, VM, Easterwood, C and Wang, G. 2017. Restricted cross-scale habitat selection by American beavers. Current Zoology, 63(6): 703–710. DOI: https://doi.org/10.1093/cz/zox059
Frey, UJ and Cox, M. 2015. Building a diagnostic ontology of social-ecological systems. International Journal of the Commons, 9(2): 595–618. DOI: https://doi.org/10.18352/ijc.505
Gammon Ranges. 2017. Gammon Ranges (Nature Conservation Society) Survey. Data Discovery Portal, Terrestrial Ecosystem Research Network (TERN), The University of Queensland, Australia. Available at: http://portal.tern.org.au/#/4fb352b1 [Last accessed 2 April 2018].
GDAL. 2017. gdal translate. Available at: www.gdal.org/gdal_translate.html [Last accessed 9 September 2017].
GMU. 2017. Classified Information and Personnel Security Clearances: University Policy Number 1119. University Policy, George Mason University. Available at: https://universitypolicy.gmu.edu/policies/classified-information-and-personnel-security-clearances/ [Last accessed 11 September 2017].
Guinote, A. 2017. How power affects people: Activating, wanting, and goal seeking. Annual Review of Psychology, 68: 353–381. DOI: https://doi.org/10.1146/annurev-psych-010416-044153
Haas, TC. 2001. A web-based system for public-private sector collaborative ecosystem management. Stochastic Environmental Research and Risk Assessment, 15: 101–131. DOI: https://doi.org/10.1007/s004770000062
Haas, TC. 2011. Improving Natural Resource Management: Ecological and Political Models. Wiley-Blackwell, Chichester, U.K. DOI: https://doi.org/10.1002/9780470979334
Haas, TC. 2018. Rhino Ecosystem Management Tool, online resource. Available at: www4.uwm.edu/people/haas/rhino_emt [Last accessed 21 March 2018].
Haas, TC and Ferreira, SM. 2015. Federated databases and actionable intelligence: Using social network analysis to disrupt transnational wildlife trafficking criminal networks. Security Informatics, 4(1). DOI: https://doi.org/10.1186/s13388-015-0018-8
Haas, TC and Ferreira, SM. 2016a. Conservation risks: When will rhinos be extinct? IEEE Transactions on Cybernetics, 46(8): 1721–1724. DOI: https://doi.org/10.1109/TCYB.2015.2470520
Haas, TC and Ferreira, SM. 2016b. Combating rhino horn trafficking: The need to disrupt criminal networks. PLoS ONE, 11(11): e0167040. DOI: https://doi.org/10.1371/journal.pone.0167040
Haas, TC and Ferreira, SM. 2018. Finding politically feasible conservation strategies: The case of wildlife trafficking. Ecological Applications, 28(20): 473–494. DOI: https://doi.org/10.1002/eap.1662
Hansman, S and Hut, R. 2005. A taxonomy of network and computer attacks. Computers & Security, 24: 31–43. DOI: https://doi.org/10.1016/j.cose.2004.06.011
Hedley, J. 2017. jsoup: Java HTML Parser. Available at: https://jsoup.org [Last accessed 11 September 2017].
Hoff, E. 2003. Chapter 7: Language development in childhood. In: Handbook of Psychology, Vol. 6: Developmental Psychology, Lerner, RM, Easterbrooks, MA and Mistry, J (eds.). Hoboken, NJ: John Wiley and Sons. DOI: https://doi.org/10.1002/0471264385.wei0607
Khimm, S. 2016. China’s gold rush in the hills of Appalachia. Foreign Policy, September 7. Available at: http://foreignpolicy.com/2016/09/07/the-thrill-of-the-hunt-ginseng-smuggling-poaching-boone-north-carolina-china/ [Last accessed 11 September 2017].
Koh, LP. 2015. Poachers expected to use green drones to kill endangered wildlife. Ecological Society of Australia. https://www.ecolsoc.org.au/poachers-expected-use-green-drones-kill-endangered-wildlife [Last accessed 26 May 2018].
Köhler, M, Lukić, I and Čik, VK. 2017. Protecting information with subcodstanography. Security and Communication Networks, 13. Article ID 9130683. DOI: https://doi.org/10.1155/2017/9130683 [Last accessed 15 March 2018].
Laurila-Pant, M, Lehikoinen, A, Uusitalo, L and Venesjärvi, R. 2015. How to value biodiversity in environmental management? Ecological Indicators, 55: 1–11. DOI: https://doi.org/10.1016/j.ecolind.2015.02.034
Legalbrief. 2017. Government slated for withholding rhino poaching data. Legalbrief, May 24. Available at: legalbrief.co.za/diary/legalbrief-environmental/story/…withholding…poaching…/pdf/ [Last accessed 11 September 2017].
Leng, RJ. 1999. Behavioral Correlates of War, 1816–1979 (Computer File), 3rd Release, Middlebury College, Middlebury, VT, 1993, Study Number 8606 from the Inter-University Consortium for Political and Social Research (ICPSR), Ann Arbor, Michigan, USA. Available at: www.icpsr.umich.edu [Last accessed 12 January 2010].
Leng, RJ and Singer, JD. 1988. Militarized interstate crises: The BCOW typology and its applications. International Studies Quarterly, 32: 155–173. DOI: https://doi.org/10.2307/2600625
Library of Congress. 2017. RAR Archive Fiel Format, Version 5. Available at: https://www.loc.gov/preservation/digital/formats/fdd/fdd000460.shtml [Last accessed 19 March 2018].
Lim, KW and Buntine, W. 2014. Twitter opinion topic model: Extracting product opinions from tweets by leveraging hashtags and sentiment lexicon. CIKM’14, November 3–7. [Last accessed 11 September 2017]. DOI: https://doi.org/10.1145/2661829.2662005
Lima, JMT, Valle, D, Moretto, EM, Pulice, SMP, Zuca, NL, Roquetti, DR, Beduschi, LEC, Praia, AS, Okamoto, CPF, da Silva Carvalhaes, VL, Branco, EA, Barbezani, B, Labandera, E, Timpe, K and Kaplan, D. 2016. A social-ecological database to advance research on infrastructure development impacts in the Brazilian Amazon. Scientific Data (Nature), 3: Article number 160071. DOI: https://doi.org/10.1038/sdata.2016.71
Lin, D and Wu, X. 2009. Phrase clustering for discriminative learning. Proceedings of the 47th Annual Meeting of the ACL and the 4th IJCNLP of the AFNLP, 1030–1038, 2–7 August. Suntec, Singapore. DOI: https://doi.org/10.3115/1690219.1690290
Liu, Z, Jiang, Z, Fang, H, Li, C and Meng, Z. 2015. “Consumer Behavior” change we believe in: Demanding reduction strategy for endangered wildlife. Journal of Biodiversity and Endangered Species, 3(1). [Last accessed 11 September 2017]. DOI: https://doi.org/10.4172/2332-2543.1000141
LTER. 2017. Welcome to the LTER network data portal. Long Term Ecological Research. Available at: https://portal.lternet.edu/nis/home.jsp [Last accessed 3 April 2018].
Martinez, J and McLaughlin, MK. 2017. The best video conferencing software of 2017. PC Magazine, August 30. Available at: https://www.pcmag.com/article2/0,2817,2388678,00.asp [Last accessed 19 March 2018].
Maurer, R. 2016. Is continuous screening the future normal? Society for Human Resource Management, October 28. Available at: http://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/continuous-screening-posthire-future.aspx [Last accessed 11 September 2017].
McCune, JM, Perrig, A and Reiter, MK. 2005. Seeing-is-believing: Using camera phones for human-verifiable authentication. Proceedings of the 2005 IEEE Symposium on Security and Privacy. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1425062 [Last accessed 17 March 2018].
Michener, WK. 2015. Ecological data sharing. Ecological Informatics, 29: 33–44. DOI: https://doi.org/10.1016/j.ecoinf.2015.06.010
Mier, KL and Picquelle, SJ. 2008. Estimating abundance of spatially aggregated populations: Comparing adaptive sampling with other survey designs. Canadian Journal of Fisheries and Aquatics, 65: 176–197. DOI: https://doi.org/10.1139/f07-138
Morgan, TJH, Uomini, NT, Rendell, LE, Chouinard-Thuly, L, Street, SE, Lewis, HM, Cross, CP and Evans, C, Kearney, R, de la Torre, I, Whiten, A and Laland, KN. 2015. Experimental evidence for the co-evolution of hominin tool-making teaching and language. Nature Communications, 6, Article number: 6029. DOI: https://doi.org/10.1038/ncomms7029
Neslen, A. 2016. Poachers using science papers to target newly discovered species. The Guardian. Available at: https://www.theguardian.com/environment/2016/jan/01/poachers-using-science-papers-to-target-newly-discovered-species [Last access 26 May 2018].
Newman, G, Chandler, M, Clyde, M, McGreavy, B, Haklay, M, Ballard, H, Gray, S, Scarpino, R, Hauptfeld, R, Mellor, D and Gallo, J. 2017. Leveraging the power of place in citizen science for effective conservation decision making. Biological Conservation, 208: 55–64. DOI: https://doi.org/10.1016/j.biocon.2016.07.019
Oishi, Y and Matsunaga, T. 2014. Support system for surveying moving wild Animals in the snow using aerial remote-sensing images. International Journal of Remote Sensing, 35(4): 1374–1394. DOI: https://doi.org/10.1080/01431161.2013.876516
Park, H and Jun, C. 2009. A simple and fast algorithm for K-medoids clustering. Expert Systems with Applications, 36: 3336–3341. DOI: https://doi.org/10.1016/j.eswa.2008.01.039
Perinchery, A. 2017. Tigers, tarantuals and the online hunter. The Hindu, July 23. Available at: http://www.thehindu.com/sci-tech/energy-and-environment/tigers-tarantulas-and-the-online-hunter/article19325605.ece [Last accessed 19 March 2018].
Piskorski, J and Yangarber, R. 2013. Information extraction: Past, present, and future. In: Poibeau, T, et al. (eds.), Multi-source, Multilingual Information Extraction and Summarization 11, Theory and Applications of Natural Language Processing. Berlin: Springer-Verlag. DOI: https://doi.org/10.1007/978-3-642-28569-1_2
Presence, C. 2016. Lie detector tests for KNP rangers. IOL, January 29. Available at: http://www.iol.co.za/news/crime-courts/lie-detector-tests-for-knp-rangers-1977531 [Last accessed 11 September 2017].
Reverso. 2017. Irregular Verbs. Available at: http://conjugator.reverso.net/conjugation-irregular-ver [Last accessed 11 September 2017].
Richardson, D. 2016. WorldView-4 Set to Launch After Months Long Delay. Available at: http://www.spaceflightinsider.com/organizations/ula/worldview-4-set-to-launch-after-months-long-delay/ [Last accessed 11 September 2017].
Rissman, AR and Gillon, S. 2017. Where are ecology and biodiversity in social-ecological systems research? A review of research methods and applied recommendations. Conservation Letters, 10(1): 86–93. DOI: https://doi.org/10.1111/conl.12250
Rist, L, Felton, A, Mårald, E, Samuelsson, L, Lundmark, T and Rosvall, O. 2016. Avoiding the pitfalls of adaptive management implementation in Swedish silviculture. Ambio, 45(Suppl. 2): S140–S151. DOI: https://doi.org/10.1007/s13280-015-0750-9
Ryan, GW and Bernard, HR. 2003. Techniques to identify themes. Field Methods, 15(1): 85–109. DOI: https://doi.org/10.1177/1525822X02239569
Scheele, B and Lindenmayer, D. 2017. Scientists are accidentally helping poachers drive rare species to extinction. THE CONVERSATION, May 25. Available at: https://theconversation.com/scientists-are-accidentally-helping-poachers-drive-rare-species-to-extinction-78342 [Last accessed 19 March 2018].
Schrodt, PA and Van Brackle, D. 2013. Automated coding of political event data. Handbook of Computational Approaches to Counterterrorism, Subrahmanian, VS (ed.), 23–49. New York: Springer. DOI: https://doi.org/10.1007/978-1-4614-5311-6_2
SDZSP. 2017. Elephant Valley. Available at: http://sdzsafaripark.org/park-locations/elephan-valley [Last accessed 11 September 2017].
Shrader, AM and Owen-Smith, N. 2002. The role of companionship in the dispersal of white rhinoceroses (Ceratotherium simum). Behavioral Ecology and Sociobiology, 52(3): 255–261. DOI: https://doi.org/10.1007/s00265-002-0506-y
TalkEnglish. 2017. Top 500 Adjectives. Available at: http://www.talkenglish.com/vocabulary/top-500-adjectives.aspx [Last accessed 11 September 2017].
Terletzky, P and Ramsey, RD. 2014. A semi-automated single day image differencing technique to identify animals in aerial imagery. PLoS ONE, 9(1): d85239. DOI: https://doi.org/10.1371/journal.pone.0085239
TerraServer. 2017. Image Downloads. Available at: www.terraserver.com/products [Last accessed 11 September 2017].
TheAnimalFiles. 2014. African Elephant. Available at: http://www.theanimalfiles.com/mammals/elephants/african_elephant.html [Last accessed 11 September 2017].
Truong, VD, Dang, NVH and Hall, CM. 2016. “The marketplace management of illegal elixirs: Illicit consumption of rhin horn.” Consumption Markets and Culture, 19(4): 353–369. DOI: https://doi.org/10.1080/10253866.2015.1108915
Tu, T, Huang, PS, Hung, C and Chang, C. 2004. A fast intensity-hue-saturation fusion technique with spectral adjustment for IKONOS imagery. IEEE Geoscience and Remote Sensing Letters, 1(4): 309–312. DOI: https://doi.org/10.1109/LGRS.2004.834804
Uitto, JI. 2016. Evaluating the environment as a global public good. Evolution, 22(1): 108–115. DOI: https://doi.org/10.1177/1356389015623135
United States National Science Foundation. 2014. Earth to Data: Making Sense of Environmental Observations, 14–135. News Release. Available at: www.nsf.gov/news/news_summ.jsp?cntn_id=132973 [Last accessed 5 April 2018].
Vasani, KA. 2014. Content evocation using web scraping and semantic illustration. IOSR Journal of Computer Engineering, 16(3): 54–60. Ver. IX (May–June). DOI: https://doi.org/10.9790/0661-16395460
Virapongse, A, Brooks, S, Metcalf, EC, Zedalis, M, Gosz, J, Klisky, A and Alessa, L. 2016. A social-ecological systems approach for environmental management. Journal of Environmental Management, 178: 83–91. DOI: https://doi.org/10.1016/j.jenvman.2016.02.028
Wang, S, Li, X, Ge, Y, Jin, R, Ma, M, Liu, Q, Wen, J and Liu, S. 2016. Validation of regional-scale remote sensing products in China: From site to network. Remote Sensing, 8(980). DOI: https://doi.org/10.3390/rs8120980
Warner, KE. 1977. The effects of the anti-smoking campaign on cigarette consumption. American Journal of Public Health, 67(7): 645–650. DOI: https://doi.org/10.2105/AJPH.67.7.645
Welz, A. 2017. Unnatural surveillance: How online data is putting species at risk. Yale Environment 360. Available at: https://e360.yale.edu/features/unnatural-surveillance-how-online-data-is-putting-species-at-risk [Last accessed 26 May 2018].
Wernick, A. 2017. Online location data on endangered species might be putting them in harm’s way. Public Radio International, October 15. Available at: https://www.pri.org/stories/2017-10-15/online-location-data-endangered-species-might-be-putting-them-harm-s-way [Last accessed 19 March 2018].
Yang, Z, Wang, T, Sidmore, AK, de Leeuw, J, Said, MY and Freer, J. 2014. Spotting East African mammals in open savannah from space. PLoS ONE, 9(12): e115989. DOI: https://doi.org/10.1371/journal.pone.0115989
Yujian, L and Bo, L. 2007. A normalized Levenshtein distance metric. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6): 1091–1095. June. DOI: https://doi.org/10.1109/TPAMI.2007.1078
Zandbergen, PA. 2014. Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual-level data. Advances in Medicine. [Last accessed 5 April 2018]. DOI: https://doi.org/10.1155/2014/567049
Zapf, A, Castell, S, Morawietz, L and Karch, A. 2016. Measuring inter-rater reliability for nominal data – which coefficients and confidence intervals are appropriate? BMC Medical Research Methodology, 16(93). DOI: https://doi.org/10.1186/s12874-016-0200-9