SlideShare a Scribd company logo
The Confluence of Protected Areas and
   Armed Conflict in Central Africa
        Jake Lowenstein (jlowenstein@AMNH.org)
Grus japonensis
“In some respects, indeed, wildlife benefits
from warfare: combatant armies effectively
designate war zones as “off limits” to casual
wanderers thus quarantining large areas of
Africa from hunters and poachers.” Meyers
(1979).
Virtually no work has been done to
quantify large-scale patterns on the
relationships between civil-conflict
and biodiversity.
Project Idea
• To model the spatial-temporal relationships
  between protected areas and civil conflict
  in Central Africa 1960-present.
  • Is conflict more likely to occur with proximity
    to PAs?
  • Is conflict more likely to occur after PA
    designation?
Datasets


• World Database on Protected Areas
• Armed Conflict Location and Events
  Dataset (ACLED)
ACLED

• Designed for disaggregated conflict analysis
  and crisis mapping
•  Data are currently being coded from 1997
  to early 2010 and the project continues to
  backdate conflict information for African
  states to the year of independence.
ACLED

• These data contain information on
 • the date and location of conflict events
 • the type of event
 • the rebel and other groups involved
 • changes in territorial control. 
ACLED
•  Events are derived from a variety of
  sources, mainly concentrating on reports
  from war zones, humanitarian agencies, and
  research publications.
• The precision of each event is coded.
• Data can be assimilated easily into any GIS,
  mapping program, or statistical package.
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict
Jake Lowenstein - Protected areas and civil conflict

More Related Content

More from Javier de la Torre

Open Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenibleOpen Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenible
Javier de la Torre
 
Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...
Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...
Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...Javier de la Torre
 
Leif Percifield - Connecting New York residents to where their waste water goes
Leif Percifield - Connecting New York residents to where their waste water goesLeif Percifield - Connecting New York residents to where their waste water goes
Leif Percifield - Connecting New York residents to where their waste water goesJavier de la Torre
 
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...Javier de la Torre
 
Aaron Steele - Using VisualRaster to explore WorldClim data
Aaron Steele - Using VisualRaster to explore WorldClim data Aaron Steele - Using VisualRaster to explore WorldClim data
Aaron Steele - Using VisualRaster to explore WorldClim data Javier de la Torre
 
Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day Javier de la Torre
 
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database Javier de la Torre
 
Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse
Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse
Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse Javier de la Torre
 
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...Javier de la Torre
 
Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking Javier de la Torre
 
The invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la TorreThe invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la TorreJavier de la Torre
 
Cartoset
CartosetCartoset
Mapping OldWeather
Mapping OldWeatherMapping OldWeather
Mapping OldWeather
Javier de la Torre
 
Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?Javier de la Torre
 
Planet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@HomePlanet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@Home
Javier de la Torre
 
Presentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon HuttonPresentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon HuttonJavier de la Torre
 
What a life. The story of Large Blue
What a life. The story of Large BlueWhat a life. The story of Large Blue
What a life. The story of Large Blue
Javier de la Torre
 

More from Javier de la Torre (20)

Open Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenibleOpen Data y Open Source aplicados a turismo sostenible
Open Data y Open Source aplicados a turismo sostenible
 
Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...
Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...
Frank Biasi - Combining Maps, Multimedia, and Narrative to Inspire People to ...
 
Leif Percifield - Connecting New York residents to where their waste water goes
Leif Percifield - Connecting New York residents to where their waste water goesLeif Percifield - Connecting New York residents to where their waste water goes
Leif Percifield - Connecting New York residents to where their waste water goes
 
9 lowenstein
9 lowenstein9 lowenstein
9 lowenstein
 
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
Francois Grey - ForestWatchers – hacking tools for submitting and geotagging ...
 
Aaron Steele - Using VisualRaster to explore WorldClim data
Aaron Steele - Using VisualRaster to explore WorldClim data Aaron Steele - Using VisualRaster to explore WorldClim data
Aaron Steele - Using VisualRaster to explore WorldClim data
 
Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day Stuart Lynn - OldWeather - Visualizing climate data of the day
Stuart Lynn - OldWeather - Visualizing climate data of the day
 
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
Ackbar Joolia - Traffic in endangered species: visualizing the CITES database
 
Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse
Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse
Yasser Ansari - Networked Organisms - Measuring Mother Nature's Pulse
 
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
Andy Rossmeissl - Learning from Climategate: New Strategies for a Skeptical W...
 
Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking Wendy Brawer - Extending the impacts of Green Mapmaking
Wendy Brawer - Extending the impacts of Green Mapmaking
 
2 mills
2 mills2 mills
2 mills
 
1 kraft
1 kraft1 kraft
1 kraft
 
The invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la TorreThe invasion of the starlings - Javier de la Torre
The invasion of the starlings - Javier de la Torre
 
Cartoset
CartosetCartoset
Cartoset
 
Mapping OldWeather
Mapping OldWeatherMapping OldWeather
Mapping OldWeather
 
Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?Protected Planet: Where and what we need to protect?
Protected Planet: Where and what we need to protect?
 
Planet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@HomePlanet Hunters as presented at Brasil@Home
Planet Hunters as presented at Brasil@Home
 
Presentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon HuttonPresentation at the Master in Global Environmental Change by Jon Hutton
Presentation at the Master in Global Environmental Change by Jon Hutton
 
What a life. The story of Large Blue
What a life. The story of Large BlueWhat a life. The story of Large Blue
What a life. The story of Large Blue
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Jake Lowenstein - Protected areas and civil conflict

  • 1.
  • 2. The Confluence of Protected Areas and Armed Conflict in Central Africa Jake Lowenstein (jlowenstein@AMNH.org)
  • 3.
  • 5.
  • 6.
  • 7.
  • 8. “In some respects, indeed, wildlife benefits from warfare: combatant armies effectively designate war zones as “off limits” to casual wanderers thus quarantining large areas of Africa from hunters and poachers.” Meyers (1979). Virtually no work has been done to quantify large-scale patterns on the relationships between civil-conflict and biodiversity.
  • 9.
  • 10. Project Idea • To model the spatial-temporal relationships between protected areas and civil conflict in Central Africa 1960-present. • Is conflict more likely to occur with proximity to PAs? • Is conflict more likely to occur after PA designation?
  • 11. Datasets • World Database on Protected Areas • Armed Conflict Location and Events Dataset (ACLED)
  • 12. ACLED • Designed for disaggregated conflict analysis and crisis mapping •  Data are currently being coded from 1997 to early 2010 and the project continues to backdate conflict information for African states to the year of independence.
  • 13. ACLED • These data contain information on • the date and location of conflict events • the type of event • the rebel and other groups involved • changes in territorial control. 
  • 14. ACLED •  Events are derived from a variety of sources, mainly concentrating on reports from war zones, humanitarian agencies, and research publications. • The precision of each event is coded. • Data can be assimilated easily into any GIS, mapping program, or statistical package.