predatory tactics
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 0)

H-INDEX

8
(FIVE YEARS 0)

Author(s):  
Fumio Takeshita ◽  
Takumi Maekawa

AbstractParatectonatica tigrina employs three predatory tactics against bivalve prey: wall-drilling, edge-drilling and non-drilling (suffocation) tactics. In this study, we conducted laboratory experiments to examine the predator–prey interactions between the naticid gastropod P. tigrina and two species of bivalve prey, Ruditapes philippinarum and Meretrix lusoria, and to investigate how predatory tactics differ for the bivalve species. Predation success increased with the shell weight ratio between predator and prey, however, there was no significant difference among prey species. The shell weight ratio significantly differed (P < 0.05) between predatory tactics against R. philippinarum, but not against M. lusoria, implying that P. tigrina determines its predatory tactics based on the shell weight ratio for R. philippinarum. However, we observed that feeding duration was not influenced by shell weight ratio or prey species, even though data were separated for each predatory tactic. These results suggest that there is no difference in feeding efficiency based on shell weight ratio between prey species and between predatory tactics. Paratectonatica tigrina may alter its predatory tactics suitably depending on the prey species and the relative size difference, despite the same feeding efficiency.


2019 ◽  
Vol 3 (1) ◽  
pp. 34 ◽  
Author(s):  
Meredith Jean Scannell

Background: Advances in technology have created different platforms, such as online dating, where college students can meet other people. One serious risk factor of using online dating is the risk of sexual assault. Many sexual predators will use online dating as a method to connect with potential victims who are often vulnerable and trusting.Aim: This paper discusses the risk of sexual assault among college students who use online dating sites. Faculty can be pivotal in educating students on the dangers of online dating and sexual assault. In addition, faculty members are in a position to recognize signs students may be exhibiting after a sexual assault, offer advice, and provide linkage to necessary services.Results: Risk factors of sexual assault are explored in depth, including predatory tactics and the vulnerability specific to college students. Provided are key safety tips for online dating as well as recommendations regarding resources and reporting to law enforcement.Conclusions: Online dating is popular among college students. Educating students in safety factors will enable them to consider the potential dangers and risk of sexual assault. In addition, higher education institutions must consider the needs of students and provide links to resources, support systems and reporting mechanisms.


2019 ◽  
Author(s):  
Chaitanya S. Gokhale ◽  
Anne E. Wignall

AbstractPredator-prey systems are ubiquitous across ecological systems. Typical ecological models focus on the dynamics of predator-prey populations. Eco-evolutionary models integrate arms race or Red-Queen like dynamics. The roles of the predator and prey species are always assumed to be static. Nevertheless, sometimes predators can bite off more than they can chew. For example, predators that encounter multiple or dangerous prey types may need to develop new predatory tactics to capture prey. We explore the dynamics of predator-prey dynamics when the prey can injure or kill the predator. This common ecological scenario places pressure on the predator to develop novel predatory tactics to both capture prey and avoid counter-attack from prey. Taking a bottom-up approach, we develop the Holling function mechanistically and then implement it in a model of innovationselection dynamics inspired by economic theory. We show how an interdisciplinary approach can be used to explain the emergence of complex predatory behaviours. Notably, our study shows why predators may hunt dangerous prey even when safe prey are available. In a broader context, we demonstrate how a multidisciplinary approach combining ecology, evolution and economics improves our understanding of a complex behavioural trait.


Author(s):  
David George Surdam

This chapter focuses on the Congressional hearings conducted in 1982 and 1984–1985 to address the issue of franchise relocation. It first considers the so-called community protection acts that were introduced during the early 1980s in the wake of franchise relocations in the National Football League (NFL) and the lingering ill-will triggered by the expansion Washington Senators' move to Texas. It then looks at the legal wrangling between the NFL and Al Davis over his relocation of the Oakland Raiders to Los Angeles, along with legislators' push for franchise expansion and their doubts about revenue sharing in the NFL and Major League Baseball (MLB). It also examines the United States Football League's (USFL) antitrust suit against the NFL accusing it of being an illegal monopoly and using predatory tactics to thwart the USFL.


Author(s):  
Gregory T. Jenkins ◽  
Robert W. Bing

Thirty years ago, Microsoft Corp. was founded by Bill Gates and Paul Allen.  To understand how the company has gained competitive advantage we examine how the company used unfair, anti-competitive, and predatory approaches in their business.  We discuss how we have come to the belief that the government settlement in United States and State of New York, et al., v. Microsoft Corporation imposing restrictions on Microsoft’s behavior and monitoring its actions for compliance is not enough to keep it from abusing its monopolistic power and does too little to prevent it from dominating the software and operating system industry today.


2008 ◽  
Vol 12 (1) ◽  
pp. 23-27 ◽  
Author(s):  
Anne E. Wignall ◽  
Phillip W. Taylor

Sign in / Sign up

Export Citation Format

Share Document