Cryptic invasions can be defined as ‘the occurrence of an invasive species or genotype that was not previously recognised as alien in origin or not distinguished from other aliens’. Such invasions can result in negative impacts on the recipient ecosystems and disturb the evolutionary history of native plant populations. Many cryptic invasions have become so problematic that there is a need to implement control measures. This paper explores the potential for biological control to be implemented as a means of managing cryptic invasions. Firstly, the paper defines the different forms of cryptic invasion, differentiating between interspecific and intraspecific invasions; this hierarchy influences how to detect, study and ultimately implement biological control when cryptic invasions occur. Secondly, unique challenges associated with biological control programmes for cryptic invasions are addressed, including: the need for intraspecific level host specificity in agents, the occurrence of hybridisation between native species/lineages and the target weed, the role of enemy release in cryptic invasions in the presence of closely related native plant species/lineages, and a review of potential stakeholder conflicts of interest and legislation. Biological control of cryptic invasions has been shown to be possible, however the process will be more difficult and complex than controlling traditional targets and will likely take up more time and resources. If these challenges are overcome, then biological control programmes against cryptic invasions should be able to proceed and maintain the same standards as traditional biological control programmes.

Canavan, K., Canavan, S., Harms, N.E., Lambertini, C., Paterson, I.D., Thum, R. (2020). The potential for biological control on cryptic plant invasions. BIOLOGICAL CONTROL, 144, 1-9 [10.1016/j.biocontrol.2020.104243].

The potential for biological control on cryptic plant invasions

Lambertini, Carla;
2020

Abstract

Cryptic invasions can be defined as ‘the occurrence of an invasive species or genotype that was not previously recognised as alien in origin or not distinguished from other aliens’. Such invasions can result in negative impacts on the recipient ecosystems and disturb the evolutionary history of native plant populations. Many cryptic invasions have become so problematic that there is a need to implement control measures. This paper explores the potential for biological control to be implemented as a means of managing cryptic invasions. Firstly, the paper defines the different forms of cryptic invasion, differentiating between interspecific and intraspecific invasions; this hierarchy influences how to detect, study and ultimately implement biological control when cryptic invasions occur. Secondly, unique challenges associated with biological control programmes for cryptic invasions are addressed, including: the need for intraspecific level host specificity in agents, the occurrence of hybridisation between native species/lineages and the target weed, the role of enemy release in cryptic invasions in the presence of closely related native plant species/lineages, and a review of potential stakeholder conflicts of interest and legislation. Biological control of cryptic invasions has been shown to be possible, however the process will be more difficult and complex than controlling traditional targets and will likely take up more time and resources. If these challenges are overcome, then biological control programmes against cryptic invasions should be able to proceed and maintain the same standards as traditional biological control programmes.
2020
Canavan, K., Canavan, S., Harms, N.E., Lambertini, C., Paterson, I.D., Thum, R. (2020). The potential for biological control on cryptic plant invasions. BIOLOGICAL CONTROL, 144, 1-9 [10.1016/j.biocontrol.2020.104243].
Canavan, Kim; Canavan, Susan; Harms, Nathan E.; Lambertini, Carla; Paterson, Iain D.; Thum, Ryan
File in questo prodotto:
Eventuali allegati, non sono esposti

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/798714
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 7
social impact