Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/23520
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHester, Susanen
dc.contributor.authorHauser, Cindy Een
dc.contributor.authorKean, John Men
local.source.editorEditor(s): Andrew P Robinson, Terry Walshe, Mark A Burgman and Mike Nunnen
dc.date.accessioned2018-07-23T11:47:00Z
dc.date.issued2017en
dc.identifier.citationInvasive Species: Risk Assessment and Management, p. 17-52en
dc.identifier.isbn9781139019606en
dc.identifier.isbn9780521765961en
dc.identifier.isbn9780521146746en
dc.identifier.urihttps://hdl.handle.net/1959.11/23520en
dc.description.abstractBiosecurity surveillance is the collection, collation, analysis, interpretation and timely dissemination of information on the presence, distribution or prevalence of pests or diseases and the plants or animals that they affect (MAFBNZ, 2009b as cited in Acosta & White, 2011). When undertaken post-border, biosecurity surveillance activities are carried out for a variety of purposes: to achieve market access, to detect new pests and diseases sufficiently early to allow for cost-effective management, to establish the boundaries of a known pest or disease population and to monitor the progress of existing containment or eradication programmes. Integrated and efficient surveillance plans are essential for effective allocation of limited biosecurity resources, successful pest control and the maintenance of important export markets. In this chapter, we provide a brief overview of many of the theoretical methods and models for designing and evaluating post- border surveillance, but our focus is on the readily applicable tools that have emerged from this theoretical work. These tools range in character from rules of thumb and simple formulae to simulation models with user-friendly interfaces. We discuss how each tool fits into the postborder surveillance framework, where to locate a particular tool and the contexts in which each tool has been applied. A more detailed explanation of key theoretical methods and models can be found in other chapters of this book; for example, predicting the spread of invasives is found in Chapters 5 and 6, optimising resource allocation is in Chapter 15, while the theory behind eradication, scenario trees and pathways analysis is given in Chapters 16 and 17. Our discussion assumes that the reader has some knowledge of the many concepts and methods from economics and statistics that are relevant to post-border surveillance. Rather than include an explanation of these, we refer the reader to Chapter 10 for a discussion of economic concepts, and to Chapter 18 for a discussion on key statistical concepts and well-known sampling designs. We do, however, include a discussion on the likelihood of detecting a pest or disease that is central to the quantitative surveillance tools reviewed in this chapter.en
dc.languageenen
dc.publisherCambridge University Pressen
dc.relation.ispartofInvasive Species: Risk Assessment and Managementen
dc.relation.isversionof1en
dc.titleTools for Designing and Evaluating Post-Border Surveillance Systemsen
dc.typeBook Chapteren
dc.identifier.doi10.1017/9781139019606.003en
dc.subject.keywordsCommunity Ecology (excl. Invasive Species Ecology)en
dc.subject.keywordsEnvironment and Resource Economicsen
local.contributor.firstnameSusanen
local.contributor.firstnameCindy Een
local.contributor.firstnameJohn Men
local.subject.for2008060202 Community Ecology (excl. Invasive Species Ecology)en
local.subject.for2008140205 Environment and Resource Economicsen
local.subject.seo2008960405 Control of Pests, Diseases and Exotic Species at Regional or Larger Scalesen
local.profile.schoolUNE Business Schoolen
local.profile.emailshester@une.edu.auen
local.output.categoryB1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.identifier.epublicationsrecordune-20170720-153625en
local.publisher.placeCambridge, United Kingdomen
local.identifier.totalchapters18en
local.format.startpage17en
local.format.endpage52en
local.contributor.lastnameHesteren
local.contributor.lastnameHauseren
local.contributor.lastnameKeanen
dc.identifier.staffune-id:shesteren
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:23702en
dc.identifier.academiclevelAcademicen
local.title.maintitleTools for Designing and Evaluating Post-Border Surveillance Systemsen
local.output.categorydescriptionB1 Chapter in a Scholarly Booken
local.relation.urlhttps://trove.nla.gov.au/work/216815632en
local.search.authorHester, Susanen
local.search.authorHauser, Cindy Een
local.search.authorKean, John Men
Appears in Collections:Book Chapter
UNE Business School
Files in This Item:
4 files
File Description SizeFormat 
Show simple item record

Page view(s)

230
checked on Feb 8, 2019
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.