SlideShare a Scribd company logo
The Confluence of Protected Areas and
   Armed Conflict in Central Africa
        Jake Lowenstein (jlowenstein@AMNH.org)
Grus japonensis
“In some respects, indeed, wildlife benefits
from warfare: combatant armies effectively
designate war zones as “off limits” to casual
wanderers thus quarantining large areas of
Africa from hunters and poachers.” Meyers
(1979).
Virtually no work has been done to
quantify large-scale patterns on the
relationships between civil-conflict
and biodiversity.
Project Idea
• To model the spatial-temporal relationships
  between protected areas and civil conflict
  in Central Africa 1960-present.
  • Is conflict more likely to occur with proximity
    to PAs?
  • Is conflict more likely to occur after PA
    designation?
Datasets


• World Database on Protected Areas
• Armed Conflict Location and Events
  Dataset (ACLED)
ACLED

• Designed for disaggregated conflict analysis
  and crisis mapping
•  Data are currently being coded from 1997
  to early 2010 and the project continues to
  backdate conflict information for African
  states to the year of independence.
ACLED

• These data contain information on
 • the date and location of conflict events
 • the type of event
 • the rebel and other groups involved
 • changes in territorial control. 
ACLED
•  Events are derived from a variety of
  sources, mainly concentrating on reports
  from war zones, humanitarian agencies, and
  research publications.
• The precision of each event is coded.
• Data can be assimilated easily into any GIS,
  mapping program, or statistical package.
9 lowenstein
9 lowenstein
9 lowenstein
9 lowenstein
9 lowenstein
9 lowenstein
9 lowenstein
9 lowenstein

More Related Content

More from Javier de la Torre

Global deforestation through time. Presentation at ESA
Global deforestation through time. Presentation at ESAGlobal deforestation through time. Presentation at ESA
Global deforestation through time. Presentation at ESA
Javier de la Torre
 
GIS is dead, long live GIS!
GIS is dead, long live GIS!GIS is dead, long live GIS!
GIS is dead, long live GIS!
Javier de la Torre
 
El GIS ha muerto, larga vida al GIS
El GIS ha muerto, larga vida al GISEl GIS ha muerto, larga vida al GIS
El GIS ha muerto, larga vida al GIS
Javier de la Torre
 
Open Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenibleOpen Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenible
Javier de la Torre
 
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...Javier de la Torre
 
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict Javier de la Torre
 
Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day Javier de la Torre
 
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database Javier de la Torre
 
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...Javier de la Torre
 
Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking Javier de la Torre
 
The invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la TorreThe invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la TorreJavier de la Torre
 
Cartoset
CartosetCartoset
Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?Javier de la Torre
 
Planet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@HomePlanet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@Home
Javier de la Torre
 
Presentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon HuttonPresentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon HuttonJavier de la Torre
 
What a life. The story of Large Blue
What a life. The story of Large BlueWhat a life. The story of Large Blue
What a life. The story of Large Blue
Javier de la Torre
 
Tracking the Global Biodiversity Targets
Tracking the Global Biodiversity TargetsTracking the Global Biodiversity Targets
Tracking the Global Biodiversity Targets
Javier de la Torre
 

More from Javier de la Torre (20)

Global deforestation through time. Presentation at ESA
Global deforestation through time. Presentation at ESAGlobal deforestation through time. Presentation at ESA
Global deforestation through time. Presentation at ESA
 
GIS is dead, long live GIS!
GIS is dead, long live GIS!GIS is dead, long live GIS!
GIS is dead, long live GIS!
 
Siglibre english
Siglibre englishSiglibre english
Siglibre english
 
El GIS ha muerto, larga vida al GIS
El GIS ha muerto, larga vida al GISEl GIS ha muerto, larga vida al GIS
El GIS ha muerto, larga vida al GIS
 
Open Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenibleOpen Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenible
 
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
 
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
 
Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day
 
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
 
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
 
Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking
 
2 mills
2 mills2 mills
2 mills
 
1 kraft
1 kraft1 kraft
1 kraft
 
The invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la TorreThe invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la Torre
 
Cartoset
CartosetCartoset
Cartoset
 
Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?
 
Planet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@HomePlanet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@Home
 
Presentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon HuttonPresentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon Hutton
 
What a life. The story of Large Blue
What a life. The story of Large BlueWhat a life. The story of Large Blue
What a life. The story of Large Blue
 
Tracking the Global Biodiversity Targets
Tracking the Global Biodiversity TargetsTracking the Global Biodiversity Targets
Tracking the Global Biodiversity Targets
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

9 lowenstein

  • 1.
  • 2. The Confluence of Protected Areas and Armed Conflict in Central Africa Jake Lowenstein (jlowenstein@AMNH.org)
  • 3.
  • 5.
  • 6.
  • 7.
  • 8. “In some respects, indeed, wildlife benefits from warfare: combatant armies effectively designate war zones as “off limits” to casual wanderers thus quarantining large areas of Africa from hunters and poachers.” Meyers (1979). Virtually no work has been done to quantify large-scale patterns on the relationships between civil-conflict and biodiversity.
  • 9.
  • 10. Project Idea • To model the spatial-temporal relationships between protected areas and civil conflict in Central Africa 1960-present. • Is conflict more likely to occur with proximity to PAs? • Is conflict more likely to occur after PA designation?
  • 11. Datasets • World Database on Protected Areas • Armed Conflict Location and Events Dataset (ACLED)
  • 12. ACLED • Designed for disaggregated conflict analysis and crisis mapping •  Data are currently being coded from 1997 to early 2010 and the project continues to backdate conflict information for African states to the year of independence.
  • 13. ACLED • These data contain information on • the date and location of conflict events • the type of event • the rebel and other groups involved • changes in territorial control. 
  • 14. ACLED •  Events are derived from a variety of sources, mainly concentrating on reports from war zones, humanitarian agencies, and research publications. • The precision of each event is coded. • Data can be assimilated easily into any GIS, mapping program, or statistical package.