Profiling unauthorized natural resource users for better targeting of conservation interventions

Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using whi...

Full description

Saved in:
Bibliographic Details
Published inConservation biology Vol. 29; no. 6; pp. 1636 - 1646
Main Authors Harrison, Mariel, Baker, Julia, Twinamatsiko, Medard, Milner‐Gulland, E.J
Format Journal Article
LanguageEnglish
Published United States Blackwell Scientific Publications 01.12.2015
Blackwell Publishing Ltd
Wiley Periodicals Inc
John Wiley and Sons Inc
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management‐relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be managed transparently and equitably.
Bibliography:http://dx.doi.org/10.1111/cobi.12575
Details of the survey methods, including how ethical issues were addressed, the UTC (Appendix S1), and of socioeconomic variables, UCT models, and saliences of all motivations and deterrents (Appendix S2) are available online. The authors are solely responsible for the content and functionality of these materials. Queries (other than absence of the material) should be directed to the corresponding author. Figure S1. Sample Unmatched Count Technique cards, showing the control card on the left and the treatment card on the right, including the sensitive item, in this case bushmeat. Table S1. Changes in wealth and education according to education and proximity to Bwindi Impenetrable National Park, roads and trading centers. Table S2. Variation in socioeconomic characteristics of resource user groups compared to the baseline sample mean. Table S3. Set of models selected based on AICc for bushmeat consumption. Table S4. Set of models selected based on AICc for firewood collection from the park. Table S5. Motivations for resource use, as ranked by 17 focus groups. Table S6. Deterrents against resource use, as ranked by 17 focus groups.
ark:/67375/WNG-ZDK7Z3CF-N
istex:689E4990C6B489568ABE04893108B753C4A3F13E
ArticleID:COBI12575
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:0888-8892
1523-1739
DOI:10.1111/cobi.12575