We have located links that may give you full text access.
JOURNAL ARTICLE
REVIEW
Cryptic invasions: A review.
Science of the Total Environment 2018 Februrary 2
Cryptic invasions are defined as the introduction and spread of non-native lineages within the species' native range (intra-specific cryptic invasion) or the invasion of non-native species that goes unnoticed due to misidentification as a native or another invasive species (inter-specific cryptic invasion). While population-specific attributes are acknowledged to play a critical role in the success and impact of biological invasions in general, our knowledge of the causes and consequences of cryptic invasions is largely neglected. Cryptic invasions are inherently difficult to recognize and, despite being likely widespread, often go undetected. In this review, we analyse the sources, mechanisms, and consequences of cryptic invasions. Using a bibliometric survey, we first quantify the relative proportion of study questions, taxa, and geographic regions. We then highlight the value of comparative information from archived specimens in uncovering the occurrence and timing of cryptic invasions. We examine the mechanisms of cryptic invasions and emphasise the role of anthropogenic environmental changes on the arrival of cryptic invaders. We then discuss the role of interspecific biological interactions in the success of cryptic invasions and the role of hybridization between native and non-native lineages in cryptic invasions. We examine the competitive advantage of some invasive lineages in key physiological, ecological or sexually-selected traits. We argue that cryptic invasions, often undetected, may trigger subsequent rapid range expansions. We suggest that cryptic invasions are much more common than currently acknowledged. We highlight the role of coevolved associations (host-parasite, mutualism, herbivory), inherently population-specific, in the impacts of cryptic invasions on local communities. Finally, we outline a framework to manage intraspecific cryptic invasions.
Full text links
Related Resources
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app
All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.
By using this service, you agree to our terms of use and privacy policy.
Your Privacy Choices
You can now claim free CME credits for this literature searchClaim now
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app