Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
***** Acces problem to record *****\

Identifieur interne : 002A410 ( Pmc/Corpus ); précédent : 002A409; suivant : 002A411 ***** probable Xml problem with record *****

Links to Exploration step


Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Investigating Differences in Vigilance Tactic Use within and between the Sexes in Eastern Grey Kangaroos</title>
<author>
<name sortKey="Rieucau, Guillaume" sort="Rieucau, Guillaume" uniqKey="Rieucau G" first="Guillaume" last="Rieucau">Guillaume Rieucau</name>
<affiliation>
<nlm:aff id="aff1">
<addr-line>Institute of Marine Research, Bergen, Norway</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff2">
<addr-line>Université de Toulouse, CNRS, ENFA; UMR 5174, Laboratoire Evolution et Diversité Biologique, Toulouse, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Blanchard, Pierrick" sort="Blanchard, Pierrick" uniqKey="Blanchard P" first="Pierrick" last="Blanchard">Pierrick Blanchard</name>
<affiliation>
<nlm:aff id="aff2">
<addr-line>Université de Toulouse, CNRS, ENFA; UMR 5174, Laboratoire Evolution et Diversité Biologique, Toulouse, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Martin, Julien G A" sort="Martin, Julien G A" uniqKey="Martin J" first="Julien G. A." last="Martin">Julien G. A. Martin</name>
<affiliation>
<nlm:aff id="aff3">
<addr-line>Department of Ecology and Evolutionary Biology, University of California Los Angeles, Los Angeles, California, United States of America</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Favreau, Francois Rene" sort="Favreau, Francois Rene" uniqKey="Favreau F" first="François-René" last="Favreau">François-René Favreau</name>
<affiliation>
<nlm:aff id="aff4">
<addr-line>Laboratoire Biométrie et Biologie Evolutive, UMR5558 Centre National de la Recherche Scientifique (CNRS), Université Claude Bernard Lyon 1, Villeurbanne, France</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff5">
<addr-line>The University of Queensland, School of Biological Sciences, Queensland, Australia</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff6">
<addr-line>Groupe Écologie et Conservation, Université d’Angers, Campus Belle Beille, Angers, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Goldizen, Anne W" sort="Goldizen, Anne W" uniqKey="Goldizen A" first="Anne W." last="Goldizen">Anne W. Goldizen</name>
<affiliation>
<nlm:aff id="aff5">
<addr-line>The University of Queensland, School of Biological Sciences, Queensland, Australia</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Pays, Olivier" sort="Pays, Olivier" uniqKey="Pays O" first="Olivier" last="Pays">Olivier Pays</name>
<affiliation>
<nlm:aff id="aff6">
<addr-line>Groupe Écologie et Conservation, Université d’Angers, Campus Belle Beille, Angers, France</addr-line>
</nlm:aff>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">22984563</idno>
<idno type="pmc">3440314</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3440314</idno>
<idno type="RBID">PMC:3440314</idno>
<idno type="doi">10.1371/journal.pone.0044801</idno>
<date when="2012">2012</date>
<idno type="wicri:Area/Pmc/Corpus">002A41</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">002A41</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Investigating Differences in Vigilance Tactic Use within and between the Sexes in Eastern Grey Kangaroos</title>
<author>
<name sortKey="Rieucau, Guillaume" sort="Rieucau, Guillaume" uniqKey="Rieucau G" first="Guillaume" last="Rieucau">Guillaume Rieucau</name>
<affiliation>
<nlm:aff id="aff1">
<addr-line>Institute of Marine Research, Bergen, Norway</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff2">
<addr-line>Université de Toulouse, CNRS, ENFA; UMR 5174, Laboratoire Evolution et Diversité Biologique, Toulouse, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Blanchard, Pierrick" sort="Blanchard, Pierrick" uniqKey="Blanchard P" first="Pierrick" last="Blanchard">Pierrick Blanchard</name>
<affiliation>
<nlm:aff id="aff2">
<addr-line>Université de Toulouse, CNRS, ENFA; UMR 5174, Laboratoire Evolution et Diversité Biologique, Toulouse, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Martin, Julien G A" sort="Martin, Julien G A" uniqKey="Martin J" first="Julien G. A." last="Martin">Julien G. A. Martin</name>
<affiliation>
<nlm:aff id="aff3">
<addr-line>Department of Ecology and Evolutionary Biology, University of California Los Angeles, Los Angeles, California, United States of America</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Favreau, Francois Rene" sort="Favreau, Francois Rene" uniqKey="Favreau F" first="François-René" last="Favreau">François-René Favreau</name>
<affiliation>
<nlm:aff id="aff4">
<addr-line>Laboratoire Biométrie et Biologie Evolutive, UMR5558 Centre National de la Recherche Scientifique (CNRS), Université Claude Bernard Lyon 1, Villeurbanne, France</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff5">
<addr-line>The University of Queensland, School of Biological Sciences, Queensland, Australia</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff6">
<addr-line>Groupe Écologie et Conservation, Université d’Angers, Campus Belle Beille, Angers, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Goldizen, Anne W" sort="Goldizen, Anne W" uniqKey="Goldizen A" first="Anne W." last="Goldizen">Anne W. Goldizen</name>
<affiliation>
<nlm:aff id="aff5">
<addr-line>The University of Queensland, School of Biological Sciences, Queensland, Australia</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Pays, Olivier" sort="Pays, Olivier" uniqKey="Pays O" first="Olivier" last="Pays">Olivier Pays</name>
<affiliation>
<nlm:aff id="aff6">
<addr-line>Groupe Écologie et Conservation, Université d’Angers, Campus Belle Beille, Angers, France</addr-line>
</nlm:aff>
</affiliation>
</author>
</analytic>
<series>
<title level="j">PLoS ONE</title>
<idno type="eISSN">1932-6203</idno>
<imprint>
<date when="2012">2012</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>Aggregation is thought to enhance an animal’s security through effective predator detection and the dilution of risk. A decline in individual vigilance as group size increases is commonly reported in the literature and called the group size effect. However, to date, most of the research has only been directed toward examining whether this effect occurs at the population level. Few studies have explored the specific contributions of predator detection and risk dilution and the basis of individual differences in the use of vigilance tactics. We tested whether male and female (non-reproductive or with young) eastern grey kangaroos (
<italic>Macropus giganteus</italic>
) adopted different vigilance tactics when in mixed-sex groups and varied in their reliance on predator detection and/or risk dilution as group size changed. This species exhibits pronounced sexual dimorphism with females being much smaller than males, making them differentially vulnerable toward predators. We combined field observations with vigilance models describing the effects of detection and dilution on scanning rates as group size increased. We found that females with and without juveniles relied on predator detection and risk dilution, but the latter adjusted their vigilance to the proportion of females with juveniles within their group. Two models appeared to equally support the data for males suggesting that males, similarly to females, relied on predator detection and risk dilution but may also have adjusted their vigilance according to the proportion of mothers within their group. Differential vulnerability may cause sex differences in vigilance tactic use in this species. The presence of males within a group that do not, or only partially, contribute to predator detection and are less at risk may cause additional security costs to females. Our results call for reexamination of the classical view of the safety advantages of grouping to provide a more detailed functional interpretation of gregariousness.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lima, Sl" uniqKey="Lima S">SL Lima</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pulliam, Hr" uniqKey="Pulliam H">HR Pulliam</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pulliam, Hr" uniqKey="Pulliam H">HR Pulliam</name>
</author>
<author>
<name sortKey="Pyke, Gh" uniqKey="Pyke G">GH Pyke</name>
</author>
<author>
<name sortKey="Caraco, T" uniqKey="Caraco T">T Caraco</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lima, Sl" uniqKey="Lima S">SL Lima</name>
</author>
<author>
<name sortKey="Dill, Lm" uniqKey="Dill L">LM Dill</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lima, Sl" uniqKey="Lima S">SL Lima</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lima, Sl" uniqKey="Lima S">SL Lima</name>
</author>
<author>
<name sortKey="Zollner, Pa" uniqKey="Zollner P">PA Zollner</name>
</author>
<author>
<name sortKey="Bednekoff, Pa" uniqKey="Bednekoff P">PA Bednekoff</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Duncan, P" uniqKey="Duncan P">P Duncan</name>
</author>
<author>
<name sortKey="Foose, Tj" uniqKey="Foose T">TJ Foose</name>
</author>
<author>
<name sortKey="Gordon, Ij" uniqKey="Gordon I">IJ Gordon</name>
</author>
<author>
<name sortKey="Gakahu, Cg" uniqKey="Gakahu C">CG Gakahu</name>
</author>
<author>
<name sortKey="Lloyd, M" uniqKey="Lloyd M">M Lloyd</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fortin, D" uniqKey="Fortin D">D Fortin</name>
</author>
<author>
<name sortKey="Boyce, Ms" uniqKey="Boyce M">MS Boyce</name>
</author>
<author>
<name sortKey="Merrill, Eh" uniqKey="Merrill E">EH Merrill</name>
</author>
<author>
<name sortKey="Fryxell, Jm" uniqKey="Fryxell J">JM Fryxell</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fernandez Juricic, E" uniqKey="Fernandez Juricic E">E Fernández-Juricic</name>
</author>
<author>
<name sortKey="Kacelnik, A" uniqKey="Kacelnik A">A Kacelnik</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pays, O" uniqKey="Pays O">O Pays</name>
</author>
<author>
<name sortKey="Renaud, P C" uniqKey="Renaud P">P-C Renaud</name>
</author>
<author>
<name sortKey="Loisel, P" uniqKey="Loisel P">P Loisel</name>
</author>
<author>
<name sortKey="Petit, M" uniqKey="Petit M">M Petit</name>
</author>
<author>
<name sortKey="Gerard, J F" uniqKey="Gerard J">J-F Gerard</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Favreau, F R" uniqKey="Favreau F">F-R Favreau</name>
</author>
<author>
<name sortKey="Goldizen, Aw" uniqKey="Goldizen A">AW Goldizen</name>
</author>
<author>
<name sortKey="Pays, O" uniqKey="Pays O">O Pays</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Michelena, P" uniqKey="Michelena P">P Michelena</name>
</author>
<author>
<name sortKey="Deneubourg, J L" uniqKey="Deneubourg J">J-L Deneubourg</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Beauchamp, G" uniqKey="Beauchamp G">G Beauchamp</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Carter, A" uniqKey="Carter A">A Carter</name>
</author>
<author>
<name sortKey="Pays, O" uniqKey="Pays O">O Pays</name>
</author>
<author>
<name sortKey="Goldizen, A" uniqKey="Goldizen A">A Goldizen</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rieucau, G" uniqKey="Rieucau G">G Rieucau</name>
</author>
<author>
<name sortKey="Morand Ferron, J" uniqKey="Morand Ferron J">J Morand-Ferron</name>
</author>
<author>
<name sortKey="Giraldeau, L A" uniqKey="Giraldeau L">L-A Giraldeau</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lung, Ma" uniqKey="Lung M">MA Lung</name>
</author>
<author>
<name sortKey="Childress, Mj" uniqKey="Childress M">MJ Childress</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rieucau, G" uniqKey="Rieucau G">G Rieucau</name>
</author>
<author>
<name sortKey="Martin, Jga" uniqKey="Martin J">JGA Martin</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Clare D, F" uniqKey="Clare D F">F Clare D</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Childress, Mj" uniqKey="Childress M">MJ Childress</name>
</author>
<author>
<name sortKey="Lung, Ma" uniqKey="Lung M">MA Lung</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pays, O" uniqKey="Pays O">O Pays</name>
</author>
<author>
<name sortKey="Jarman, P" uniqKey="Jarman P">P Jarman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Blanchard, P" uniqKey="Blanchard P">P Blanchard</name>
</author>
<author>
<name sortKey="Sabatier, R" uniqKey="Sabatier R">R Sabatier</name>
</author>
<author>
<name sortKey="Fritz, H" uniqKey="Fritz H">H Fritz</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Quinn, Jl" uniqKey="Quinn J">JL Quinn</name>
</author>
<author>
<name sortKey="Cresswell, W" uniqKey="Cresswell W">W Cresswell</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="L Pez, P" uniqKey="L Pez P">P López</name>
</author>
<author>
<name sortKey="Hawlena, D" uniqKey="Hawlena D">D Hawlena</name>
</author>
<author>
<name sortKey="Polo, V" uniqKey="Polo V">V Polo</name>
</author>
<author>
<name sortKey="Amo, L" uniqKey="Amo L">L Amo</name>
</author>
<author>
<name sortKey="Martin, J" uniqKey="Martin J">J Martín</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ruckstuhl, Ke" uniqKey="Ruckstuhl K">KE Ruckstuhl</name>
</author>
<author>
<name sortKey="Neuhaus, P" uniqKey="Neuhaus P">P Neuhaus</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Michelena, P" uniqKey="Michelena P">P Michelena</name>
</author>
<author>
<name sortKey="Bouquet, Pm" uniqKey="Bouquet P">PM Bouquet</name>
</author>
<author>
<name sortKey="Dissac, A" uniqKey="Dissac A">A Dissac</name>
</author>
<author>
<name sortKey="Fourcassie, V" uniqKey="Fourcassie V">V Fourcassie</name>
</author>
<author>
<name sortKey="Lauga, J" uniqKey="Lauga J">J Lauga</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fairbanks, B" uniqKey="Fairbanks B">B Fairbanks</name>
</author>
<author>
<name sortKey="Dobson, Fs" uniqKey="Dobson F">FS Dobson</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Carter, Aj" uniqKey="Carter A">AJ Carter</name>
</author>
<author>
<name sortKey="Macdonald, Sl" uniqKey="Macdonald S">SL Macdonald</name>
</author>
<author>
<name sortKey="Thomson, Va" uniqKey="Thomson V">VA Thomson</name>
</author>
<author>
<name sortKey="Goldizen, Aw" uniqKey="Goldizen A">AW Goldizen</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Peter J, J" uniqKey="Peter J J">J Peter J</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pays, O" uniqKey="Pays O">O Pays</name>
</author>
<author>
<name sortKey="Goulard, M" uniqKey="Goulard M">M Goulard</name>
</author>
<author>
<name sortKey="Blomberg, Sp" uniqKey="Blomberg S">SP Blomberg</name>
</author>
<author>
<name sortKey="Goldizen, Aw" uniqKey="Goldizen A">AW Goldizen</name>
</author>
<author>
<name sortKey="Sirot, E" uniqKey="Sirot E">E Sirot</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dehn, M" uniqKey="Dehn M">M Dehn</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Colagross, A" uniqKey="Colagross A">A Colagross</name>
</author>
<author>
<name sortKey="Cockburn, A" uniqKey="Cockburn A">A Cockburn</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hurvich, Cm" uniqKey="Hurvich C">CM Hurvich</name>
</author>
<author>
<name sortKey="Tsai, C L" uniqKey="Tsai C">C-L Tsai</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Blumstein, Dt" uniqKey="Blumstein D">DT Blumstein</name>
</author>
<author>
<name sortKey="Lea, Aj" uniqKey="Lea A">AJ Lea</name>
</author>
<author>
<name sortKey="Olson, Le" uniqKey="Olson L">LE Olson</name>
</author>
<author>
<name sortKey="Martin, Jga" uniqKey="Martin J">JGA Martin</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cripps, Jk" uniqKey="Cripps J">JK Cripps</name>
</author>
<author>
<name sortKey="Wilson, Me" uniqKey="Wilson M">ME Wilson</name>
</author>
<author>
<name sortKey="Elgar, Ma" uniqKey="Elgar M">MA Elgar</name>
</author>
<author>
<name sortKey="Coulson, G" uniqKey="Coulson G">G Coulson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Short, J" uniqKey="Short J">J Short</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PLoS One</journal-id>
<journal-id journal-id-type="iso-abbrev">PLoS ONE</journal-id>
<journal-id journal-id-type="publisher-id">plos</journal-id>
<journal-id journal-id-type="pmc">plosone</journal-id>
<journal-title-group>
<journal-title>PLoS ONE</journal-title>
</journal-title-group>
<issn pub-type="epub">1932-6203</issn>
<publisher>
<publisher-name>Public Library of Science</publisher-name>
<publisher-loc>San Francisco, USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">22984563</article-id>
<article-id pub-id-type="pmc">3440314</article-id>
<article-id pub-id-type="publisher-id">PONE-D-12-05606</article-id>
<article-id pub-id-type="doi">10.1371/journal.pone.0044801</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Research Article</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Agriculture</subject>
<subj-group>
<subject>Animal Management</subject>
<subj-group>
<subject>Animal Behavior</subject>
</subj-group>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Biology</subject>
<subj-group>
<subject>Ecology</subject>
<subj-group>
<subject>Behavioral Ecology</subject>
<subject>Evolutionary Ecology</subject>
</subj-group>
</subj-group>
<subj-group>
<subject>Evolutionary Biology</subject>
<subj-group>
<subject>Animal Behavior</subject>
<subject>Behavioral Ecology</subject>
<subject>Evolutionary Ecology</subject>
</subj-group>
</subj-group>
<subj-group>
<subject>Zoology</subject>
<subj-group>
<subject>Animal Behavior</subject>
</subj-group>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Veterinary Science</subject>
<subj-group>
<subject>Animal Management</subject>
<subj-group>
<subject>Animal Behavior</subject>
<subj-group>
<subject>Sexual Behavior</subject>
</subj-group>
</subj-group>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Investigating Differences in Vigilance Tactic Use within and between the Sexes in Eastern Grey Kangaroos</article-title>
<alt-title alt-title-type="running-head">Sex Differences in Vigilance Tactics in Kangaroos</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Rieucau</surname>
<given-names>Guillaume</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="cor1">
<sup>*</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Blanchard</surname>
<given-names>Pierrick</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Martin</surname>
<given-names>Julien G. A.</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Favreau</surname>
<given-names>François-René</given-names>
</name>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
<xref ref-type="aff" rid="aff5">
<sup>5</sup>
</xref>
<xref ref-type="aff" rid="aff6">
<sup>6</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Goldizen</surname>
<given-names>Anne W.</given-names>
</name>
<xref ref-type="aff" rid="aff5">
<sup>5</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Pays</surname>
<given-names>Olivier</given-names>
</name>
<xref ref-type="aff" rid="aff6">
<sup>6</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<label>1</label>
<addr-line>Institute of Marine Research, Bergen, Norway</addr-line>
</aff>
<aff id="aff2">
<label>2</label>
<addr-line>Université de Toulouse, CNRS, ENFA; UMR 5174, Laboratoire Evolution et Diversité Biologique, Toulouse, France</addr-line>
</aff>
<aff id="aff3">
<label>3</label>
<addr-line>Department of Ecology and Evolutionary Biology, University of California Los Angeles, Los Angeles, California, United States of America</addr-line>
</aff>
<aff id="aff4">
<label>4</label>
<addr-line>Laboratoire Biométrie et Biologie Evolutive, UMR5558 Centre National de la Recherche Scientifique (CNRS), Université Claude Bernard Lyon 1, Villeurbanne, France</addr-line>
</aff>
<aff id="aff5">
<label>5</label>
<addr-line>The University of Queensland, School of Biological Sciences, Queensland, Australia</addr-line>
</aff>
<aff id="aff6">
<label>6</label>
<addr-line>Groupe Écologie et Conservation, Université d’Angers, Campus Belle Beille, Angers, France</addr-line>
</aff>
<contrib-group>
<contrib contrib-type="editor">
<name>
<surname>Waterman</surname>
<given-names>Jane M.</given-names>
</name>
<role>Editor</role>
<xref ref-type="aff" rid="edit1"></xref>
</contrib>
</contrib-group>
<aff id="edit1">
<addr-line>University of Manitoba, Canada</addr-line>
</aff>
<author-notes>
<corresp id="cor1">* E-mail:
<email>guillaume.rieucau@imr.no</email>
</corresp>
<fn fn-type="conflict">
<p>
<bold>Competing Interests: </bold>
The authors have declared that no competing interests exist.</p>
</fn>
<fn fn-type="con">
<p>Conceived and designed the experiments: GR PB JGAM FRF AWG OP. Performed the experiments: GR PB JGAM FRF AWG OP. Analyzed the data: GR PB JGAM FRF AWG OP. Contributed reagents/materials/analysis tools: GR PB JGAM FRF AWG OP. Wrote the paper: GR PB JGAM FRF AWG OP.</p>
</fn>
</author-notes>
<pub-date pub-type="collection">
<year>2012</year>
</pub-date>
<pub-date pub-type="epub">
<day>12</day>
<month>9</month>
<year>2012</year>
</pub-date>
<volume>7</volume>
<issue>9</issue>
<elocation-id>e44801</elocation-id>
<history>
<date date-type="received">
<day>23</day>
<month>2</month>
<year>2012</year>
</date>
<date date-type="accepted">
<day>14</day>
<month>8</month>
<year>2012</year>
</date>
</history>
<permissions>
<copyright-year>2012</copyright-year>
<copyright-holder>Rieucau et al</copyright-holder>
<license>
<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<abstract>
<p>Aggregation is thought to enhance an animal’s security through effective predator detection and the dilution of risk. A decline in individual vigilance as group size increases is commonly reported in the literature and called the group size effect. However, to date, most of the research has only been directed toward examining whether this effect occurs at the population level. Few studies have explored the specific contributions of predator detection and risk dilution and the basis of individual differences in the use of vigilance tactics. We tested whether male and female (non-reproductive or with young) eastern grey kangaroos (
<italic>Macropus giganteus</italic>
) adopted different vigilance tactics when in mixed-sex groups and varied in their reliance on predator detection and/or risk dilution as group size changed. This species exhibits pronounced sexual dimorphism with females being much smaller than males, making them differentially vulnerable toward predators. We combined field observations with vigilance models describing the effects of detection and dilution on scanning rates as group size increased. We found that females with and without juveniles relied on predator detection and risk dilution, but the latter adjusted their vigilance to the proportion of females with juveniles within their group. Two models appeared to equally support the data for males suggesting that males, similarly to females, relied on predator detection and risk dilution but may also have adjusted their vigilance according to the proportion of mothers within their group. Differential vulnerability may cause sex differences in vigilance tactic use in this species. The presence of males within a group that do not, or only partially, contribute to predator detection and are less at risk may cause additional security costs to females. Our results call for reexamination of the classical view of the safety advantages of grouping to provide a more detailed functional interpretation of gregariousness.</p>
</abstract>
<funding-group>
<funding-statement>GR was financially supported by a Fyssen Foundation postdoctoral fellowship and by a postdoctoral fellowship from the Institute of Marine Research, Bergen, Norway. GR and PB are at the Laboratoire Evolution et Diversité Biologique (EDB) part of the “Laboratoire d’Excellence” (LABEX) entitled TULIP (ANR -10-LABX-41). JM was funded by an Fonds de recherche du Québec Nature et technologies (FQRNT) fellowship and an National Science Foundation - Long-Term Research in Environmental Biology (NSF-LTREB) grant. AWG and F-RF were supported by research funds from the University of Queensland. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.</funding-statement>
</funding-group>
<counts>
<page-count count="8"></page-count>
</counts>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>Aggregation is commonly thought to provide security benefits to animals
<xref ref-type="bibr" rid="pone.0044801-Krebs1">[1]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Caro1">[2]</xref>
through a greater power of detection of predators (“the many eyes hypothesis”
<xref ref-type="bibr" rid="pone.0044801-Lima1">[3]</xref>
) and the dilution of risk where the nearby presence of companions decreases the likelihood of any given individual being the victim of an attack
<xref ref-type="bibr" rid="pone.0044801-Pulliam1">[4]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Pulliam2">[5]</xref>
. A well documented and taxonomically widespread effect is a decline in individual vigilance as animals’ group sizes increase: the group-size effect
<xref ref-type="bibr" rid="pone.0044801-Lima2">[6]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Lima3">[7]</xref>
. Through the combination of improved collective vigilance and risk dilution, animals in large groups benefit from an enhanced safety that allows them to reallocate time saved in vigilance to other fitness-improving activities
<xref ref-type="bibr" rid="pone.0044801-Lima4">[8]</xref>
. This reallocation might be crucial for prey species (including large mammalian herbivores) that are highly constrained by their food acquisition
<xref ref-type="bibr" rid="pone.0044801-Duncan1">[9]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Fortin1">[10]</xref>
. In addition to its anti-predator component, vigilance may also be used to monitor other group members to collect information about their activities (e.g. vigilance, foraging or agonistic interactions)
<xref ref-type="bibr" rid="pone.0044801-FernndezJuricic1">[11]</xref>
. Thus, vigilance levels exhibited by group-living animals also reflect a trade-off between minimizing their risk of predation and gathering information about their social environment.</p>
<p>To date most of the effort devoted to studying the relationship between the group size and vigilance of prey species has been directed toward examining whether the classical group-size effect occurs at the population level
<xref ref-type="bibr" rid="pone.0044801-Pays1">[12]</xref>
<xref ref-type="bibr" rid="pone.0044801-Michelena1">[14]</xref>
. The group-size effect has only recently been studied at the individual level
<xref ref-type="bibr" rid="pone.0044801-Beauchamp1">[15]</xref>
<xref ref-type="bibr" rid="pone.0044801-Rieucau1">[17]</xref>
. Several studies have reported that group members may differ in their contribution to the overall group vigilance and can adopt different vigilance tactics
<xref ref-type="bibr" rid="pone.0044801-Rieucau1">[17]</xref>
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
. Inter-individual differences in investment in vigilance may arise from differences between sexes
<xref ref-type="bibr" rid="pone.0044801-ClareD1">[20]</xref>
<xref ref-type="bibr" rid="pone.0044801-Pays2">[22]</xref>
, life history stages
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
, spatial positions within the group
<xref ref-type="bibr" rid="pone.0044801-Blanchard1">[23]</xref>
or personality types
<xref ref-type="bibr" rid="pone.0044801-Quinn1">[24]</xref>
. For instance, several studies have been undertaken to unravel the basis of sex differences in individual investment in vigilance
<xref ref-type="bibr" rid="pone.0044801-Pays2">[22]</xref>
. The sexes may experience different vigilance-induced costs based on reproduction, physiology or personality traits, suggesting a possible sex-dependence of the vigilance tactics used to achieve the safety benefits of grouping
<xref ref-type="bibr" rid="pone.0044801-Lung1">[18]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Lpez1">[25]</xref>
. Despite the growing interest in exploring this question, little is known about the specific mechanisms underlying sex differences in vigilance, as males and females have many reasons to have evolved differences in their vigilance tactics. For instance, males trying to achieve mating or to limit the access of rivals to females should spend more time in vigilance, whereas females experiencing high costs of lactation should spend more time feeding, therefore being less vigilant. However, the presence of dependent young might lead females to increase their vigilance effort. Finally, differential vulnerability toward predators (e.g. in sexually dimorphic species), or differences in activity budgets and/or habitat use
<xref ref-type="bibr" rid="pone.0044801-Ruckstuhl1">[26]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Michelena2">[27]</xref>
, might also explain variation in vigilance tactic use between males and females. In addition, only a few empirical studies have examined the specific contributions of both predator detection and risk dilution and the basis of individual differences in the vigilance tactics employed by group-living animals to improve their safety
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Fairbanks1">[28]</xref>
.</p>
<p>We studied the vigilance behaviour of adult free-ranging eastern grey kangaroos (
<italic>Macropus giganteus</italic>
) with the aim of examining whether males and females (non-reproductive or with young) adopted different vigilance tactics and varied in their reliance on predator detection and/or risk dilution as group size changed. The eastern grey kangaroo appears to be a good biological model because 1) this species shows a dynamic fission-fusion system in which individuals change groups multiple times each day and experience a large range of social situations in term of group composition and size
<xref ref-type="bibr" rid="pone.0044801-Carter2">[29]</xref>
and 2) it exhibits pronounced sexual body-size dimorphism with males eventually achieving body weights more than double those reached by adult females
<xref ref-type="bibr" rid="pone.0044801-Jarman1">[30]</xref>
. This dimorphism might lead to a difference in vulnerability, with males suffering lower predation pressures from dingos (
<italic>Canis lupus dingo</italic>
) and feral domestic dogs (
<italic>Canis lupus familiaris</italic>
) than females, which could allow males to be less vigilant than females when in mixed-sex groups
<xref ref-type="bibr" rid="pone.0044801-Pays2">[22]</xref>
. Red foxes (
<italic>Vulpes vulpes</italic>
) and wedge-tailed eagles (
<italic>Aquila audax</italic>
) are potential predators of juvenile kangaroos, which could also lead reproductive females to increase their vigilance
<xref ref-type="bibr" rid="pone.0044801-Jarman1">[30]</xref>
.</p>
<p>In two earlier studies, Jarman
<xref ref-type="bibr" rid="pone.0044801-PeterJ1">[31]</xref>
and Pays et al.
<xref ref-type="bibr" rid="pone.0044801-Pays1">[12]</xref>
reported declines in mean vigilance effort with increasing group sizes in this species, consistent with the classical group-size effect. Other recent studies of eastern grey kangaroos have increased our understanding of factors affecting vigilance in this species. For instance, Pays et al.
<xref ref-type="bibr" rid="pone.0044801-Pays3">[32]</xref>
reported that individuals tended to copy the vigilance activity of other group members. Moreover, individual females have been reported to vary significantly in the way that group size affects their vigilance
<xref ref-type="bibr" rid="pone.0044801-Carter1">[16]</xref>
. The group-size effect may not occur in certain populations because of the result of two compensating effects: social vigilance increases whereas anti-predator vigilance decreases with group size
<xref ref-type="bibr" rid="pone.0044801-Favreau1">[13]</xref>
. However, individual decision making underlying variation between the sexes in vigilance tactics remains largely unexplored.</p>
<p>Although vigilance patterns have been extensively studied in this species, two important questions remain unsolved. What is the relative contribution of predator detection and risk dilution to anti-predator strategies? Do males and females differ in the extent to which they rely on each mechanism as a means of reducing predation risk? We addressed these questions by combining field observations of wild kangaroos with vigilance models describing the expected effects of both detection and dilution on scanning rates (number of head-up postures per minute) as group size increases
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Dehn1">[33]</xref>
.</p>
<p>We based our working hypothesis on the suggested differential vulnerability between male and female eastern grey kangaroos
<xref ref-type="bibr" rid="pone.0044801-Pays2">[22]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-Colagross1">[34]</xref>
and tested whether males and females feeding in the same group differed in their vigilance tactics.</p>
</sec>
<sec sec-type="methods" id="s2">
<title>Methods</title>
<sec id="s2a">
<title>Study Site and Animals</title>
<p>Field work was carried out in Sundown National Park (Queensland, Australia, 28°9′S, 151°58′E) in January–March 2009, during summer. Sundown NP is composed of a mosaic of eucalypt forest, woodland and open pastures of predominantly native species. The study area contained over 150 kangaroos. Predators of kangaroos in the study area included red foxes, wedge-tailed eagles and possibly occasional domestic and feral dogs and dingos. The study site can be characterised as semi-arid with approximately 700–800 mm of rain per year, although the rainfall is highly variable.</p>
</sec>
<sec id="s2b">
<title>Behavioural Observations</title>
<p>The observer (FRF) recorded behavioural sequences when animals were active, early in the morning (05.30–07.30) and late in the afternoon (17.00–19.00) when they came onto the pasture to forage. Although the study population of kangaroos was not marked for individual recognition, the observer tried to limit re-sampling of individuals by (1) studying groups from a track that crossed open paddocks, allowing him to ensure spatial independence between groups sampled in the same morning or evening session, (2) changing the direction in which he walked along the sampling track every day, (3) ensuring that no individuals had moved between the studied groups during or between the video recordings, and (4) filming only four or five groups in a day. Although the observer was confident that no group was filmed more than once during the day, it is likely that some individuals were sampled a few times during the study. We identified a group when kangaroos maintained social and spatial cohesion during focal sampling and its most peripheral member was within 15 m of another group member
<xref ref-type="bibr" rid="pone.0044801-PeterJ1">[31]</xref>
. No ambiguities in determining group membership were encountered in the sampled groups.</p>
<p>The observer collected behavioural data by videotaping (Sony DCR-HC51E, Sony Corporation, Tokyo, Japan) all members of a focal group of kangaroos for a 5 min period. An animal was considered to be vigilant when it did not move its feet and raised its head above horizontal, scanning its surroundings. No ambiguities were encountered in distinguishing vigilant from non-vigilant animals. We only sampled relatively immobile groups in which individuals stayed in the same locations during the video sequences and the main activities of all group members were foraging and vigilance.</p>
<p>For each focal sample, the observer determined group size, group composition (i.e. numbers of adult males, adult females and juveniles) and sex of individuals (adult male, adult female with or without pouch young or young-at-foot). A pouch young is a young that either spends all of its time in its mother’s pouch, or comes and goes from the pouch, whereas a young-at-foot no longer enters the pouch but is not yet weaned. The observer also measured each individual’s distance to cover (0–25, 26–50, 51–100, 101–200, more than 200 m) and the distance to its nearest neighbour with a range finder at the end of the focal sample. To do this, the observer measured the distance between him and each individual as well as the angle between each pair of animals in the group using a protractor and then calculated inter-individual distances using trigonometric formulas. During the video sequences, group members did not exhibit apparent inter-individual interference and/or aggression, as would be expected if there was overt competition for access to food.</p>
<p>From the video sequences, we extracted the scanning rate (number of vigilant acts per minute) of each individual. Scanning rate was used as a measure of vigilance in accordance with the models developed by Dehn (1991), which express the relationship between the frequency of scans and group size. In our study, we did not identify the orientation of scans (toward the center or the exterior of the group) of individuals and thus could not ascertain the functions (anti-predatory or social) of the observed vigilant bouts. In total, we collected 358 samples on adult females and 20 on adult males (supplementary information on field sampling can be found in Favreau et al.
<xref ref-type="bibr" rid="pone.0044801-Favreau1">[13]</xref>
).</p>
</sec>
<sec id="s2c">
<title>Vigilance Models</title>
<p>We explored the expected effects of both predator detection and risk dilution on scanning rates by comparing 6 different candidate models of vigilance (modified from
<xref ref-type="bibr" rid="pone.0044801-Dehn1">[33]</xref>
; see also
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
) predicting the relationship between individuals’ scanning rates and group size. We fitted our candidate models separately to the vigilance patterns of females with and without dependant juveniles and males to investigate differences between the sexes and between females with different reproductive status.</p>
<p>
<xref ref-type="table" rid="pone-0044801-t001">Table 1</xref>
presents the 6 candidates models we compared. Our first candidate model (model 1: the detection model) predicts a decrease in individual vigilance solely based on increased early collective detection of predators with increasing group size. This model assumes that grouping reduces the level of individual vigilance required to maintain a given probability of predator detection. The second candidate model (model 2: the security model) combines effects from both increased predator detection and risk dilution on the relationship between vigilance and group size and predicts the probability that an individual will survive an attack. The third candidate model (model 3: the security model with non-vigilant animals), based on the previous security model, accounts for the presence of individuals in the group which are not actively vigilant. The main difference with model 2 is that the group size used to assess the effect of risk dilution (N: as all individuals participate in the dilution of risk) is different to the group size used to calculate the probability that the group detects an approaching predator (changed to Na which represents the number of actively vigilant individuals). Here juveniles are considered to be non-functionally vigilant individuals; thus the number of actively vigilant individuals is given by (group size - number of juveniles). This model nonetheless assumes that non-functionally vigilant group members contribute to the numerical dilution of risk. The fourth candidate model (model 4: the security model with mothers accompanied by dependant juveniles) considers the proportion of females with dependant young and accounts for the probability that both mothers and their offspring would survive an attack through the dilution of risk. Dehn (1990) made the assumption that females with juveniles experience a different dilution effect than other group members because they have to ensure that both they and their juvenile escape an attack. Therefore the classical expression of dilution of risk (N-1)/N has to be modified to (N-2)/N for a female with a juvenile, where N represents the group size (see the complete model derivation in
<xref ref-type="bibr" rid="pone.0044801-Dehn1">[33]</xref>
). Here again juveniles do not participate in collective predator detection. Finally, we developed two additional candidate models accounting for differential vulnerability between sexes. The fifth model (model 5: the low male investment (LMI) security model), derived from model 3, assumes that 1) only females (irrespective of their reproductive status) act as efficient predator detectors as they are under a higher predation risk than males and 2) males and juveniles do not participate in the detection power of the group, with males benefiting mostly from the risk dilution effect and relying on the threat detection provided by actively vigilant females. Thus the number of actively vigilant individuals in a group is given by (group size - [number of males + juveniles]). The sixth and last candidate model (model 6: LMI security model with proportion of females accompanied by dependant juveniles) is a combination of the previous one and model 4. In this model, we added the presence of mothers accompanied by dependant juveniles.</p>
<table-wrap id="pone-0044801-t001" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.t001</object-id>
<label>Table 1</label>
<caption>
<title>Candidate vigilance models modified from Dehn (1990).</title>
</caption>
<alternatives>
<graphic id="pone-0044801-t001-1" xlink:href="pone.0044801.t001"></graphic>
<table frame="hsides" rules="groups">
<colgroup span="1">
<col align="left" span="1"></col>
</colgroup>
<tbody>
<tr>
<td align="left" rowspan="1" colspan="1">
<bold>Candidate kangaroos' vigilance models:</bold>
</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">1 - Detection model</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0044801.e001.jpg"></inline-graphic>
</inline-formula>
</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">2 - Security model</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0044801.e002.jpg"></inline-graphic>
</inline-formula>
</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">3 - Security model with non-vigilant juveniles</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0044801.e003.jpg"></inline-graphic>
</inline-formula>
</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">4 - Security model with mothers accompanied by dependant juveniles</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0044801.e004.jpg"></inline-graphic>
</inline-formula>
</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">5 - Low males investment (LMI) security model</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0044801.e005.jpg"></inline-graphic>
</inline-formula>
</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">6 - Low males investment (LMI) security model accompanied by dependant juveniles</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0044801.e006.jpg"></inline-graphic>
</inline-formula>
</td>
</tr>
</tbody>
</table>
</alternatives>
<table-wrap-foot>
<fn id="nt101">
<label></label>
<p>N: group size; N
<sub>a</sub>
: Number of actively vigilant individuals (N - number of juveniles); Pw: Proportion of mothers with an offspring; N
<sub>f</sub>
: Number of all actively vigilant group members (N - number of males + juveniles); ai: parameters estimates.</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s2d">
<title>Model Selection and Data Analysis</title>
<p>We selected the model that best explained the vigilance data using the Akaike’s information criterion (AIC)
<xref ref-type="bibr" rid="pone.0044801-Burnham1">[35]</xref>
. All candidate models were compared according to the AIC statistic and ranked based on their normalized Akaike weights (AICw), where the best-fitting model had the largest AICw and the smallest AIC
<xref ref-type="bibr" rid="pone.0044801-Burnham1">[35]</xref>
. Because of our relatively small sample size (especially for males and females with dependant juveniles) we selected our models using the AICc
<xref ref-type="bibr" rid="pone.0044801-Hurvich1">[36]</xref>
. When ΔAICc, the difference in AICc values between two candidate models, was lower than 2, revealing a level of uncertainty surrounding these two closely competing models, we arbitrary selected the model with the lowest AICc value as the best candidate model. We obtained the AICc, ΔAICc, AICw values using the aictab function located in the AICcmodavg package in R 2.13.0 (R Development Core Team, 2011).</p>
<p>We ran mixed models using maximum likelihood methods (ML) to fit the set of candidate models to the vigilance data. We included each group identity within a specific observation sequence as a random effect. The random effect structure allows us to control for the effect of the group as multiple individuals from the same group were sampled during one observation session. As kangaroos were not individually marked for direct identification, we were not able to control for potential repeated measures on the same individual across different observation sessions. Non-independence of repeated measures on the same individual might affect our results. The low repeatability of scanning rate reported in bighorn sheep
<italic>(Ovis canadensis</italic>
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
) and in yellow-bellied marmots (
<italic>Marmota flaviventris</italic>
<xref ref-type="bibr" rid="pone.0044801-Blumstein1">[37]</xref>
) however, suggests that individual variation should not be a problem in our analyses. We also included the distances from the focal individual to the nearest protective cover and to the nearest group member in all models as fixed effects. Finally, all the best-fitting models selected were compared to a null model with the same random effect structure but this time only including distances to cover and to the nearest neighbour as fixed effects, using a log-likelihood ratio test.</p>
</sec>
</sec>
<sec id="s3">
<title>Results</title>
<p>Our results revealed that the best candidate model explaining the vigilance pattern of females accompanied by dependant juveniles was the security model (model 2) (
<xref ref-type="fig" rid="pone-0044801-g001">Figure 1</xref>
). The ΔAICc value between the model with the lowest AICc value (model 2) and the candidate model with the second lowest AICc value (model 5: LMI security model) was greater than 2 (ΔAICc = 4.14) (see
<xref ref-type="table" rid="pone-0044801-t002">Tables 2</xref>
and
<xref ref-type="table" rid="pone-0044801-t003">3</xref>
). Therefore we considered that the security model was the best-fitting model of our set of candidate models for females with juveniles.</p>
<fig id="pone-0044801-g001" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.g001</object-id>
<label>Figure 1</label>
<caption>
<title>Changes in scanning rates (vigilant acts per minute) as a function of group size for mothers according to the security model.</title>
</caption>
<graphic xlink:href="pone.0044801.g001"></graphic>
</fig>
<table-wrap id="pone-0044801-t002" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.t002</object-id>
<label>Table 2</label>
<caption>
<title>Model selection procedure using AICc statistics.</title>
</caption>
<alternatives>
<graphic id="pone-0044801-t002-2" xlink:href="pone.0044801.t002"></graphic>
<table frame="hsides" rules="groups">
<colgroup span="1">
<col align="left" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
</colgroup>
<thead>
<tr>
<td align="left" rowspan="1" colspan="1">a)</td>
<td colspan="3" align="left" rowspan="1">Females accompanied by dependant juveniles</td>
<td align="left" rowspan="1" colspan="1">AICc</td>
<td align="left" rowspan="1" colspan="1">ΔAICc</td>
<td align="left" rowspan="1" colspan="1">AICcw</td>
<td align="left" rowspan="1" colspan="1">k</td>
<td align="left" rowspan="1" colspan="1">Observations</td>
</tr>
</thead>
<tbody>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">
<bold>1</bold>
</td>
<td align="left" rowspan="1" colspan="1">
<bold>Model 2</bold>
</td>
<td align="left" rowspan="1" colspan="1">
<bold>Security model</bold>
</td>
<td align="left" rowspan="1" colspan="1">94.62</td>
<td align="left" rowspan="1" colspan="1">0.00</td>
<td align="left" rowspan="1" colspan="1">0.69</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">62</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">2</td>
<td align="left" rowspan="1" colspan="1">Model 5</td>
<td align="left" rowspan="1" colspan="1">LMI security model</td>
<td align="left" rowspan="1" colspan="1">98.77</td>
<td align="left" rowspan="1" colspan="1">4.14</td>
<td align="left" rowspan="1" colspan="1">0.08</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">62</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">3</td>
<td align="left" rowspan="1" colspan="1">Model 6</td>
<td align="left" rowspan="1" colspan="1">LMI security model with mothers with juveniles</td>
<td align="left" rowspan="1" colspan="1">98.85</td>
<td align="left" rowspan="1" colspan="1">4.23</td>
<td align="left" rowspan="1" colspan="1">0.08</td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">61</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">4</td>
<td align="left" rowspan="1" colspan="1">Model 4</td>
<td align="left" rowspan="1" colspan="1">Security model with mothers with juveniles</td>
<td align="left" rowspan="1" colspan="1">99.55</td>
<td align="left" rowspan="1" colspan="1">4.92</td>
<td align="left" rowspan="1" colspan="1">0.06</td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">61</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">Model 1</td>
<td align="left" rowspan="1" colspan="1">Detection model</td>
<td align="left" rowspan="1" colspan="1">99.75</td>
<td align="left" rowspan="1" colspan="1">5.12</td>
<td align="left" rowspan="1" colspan="1">0.05</td>
<td align="left" rowspan="1" colspan="1">4</td>
<td align="left" rowspan="1" colspan="1">63</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">Model 3</td>
<td align="left" rowspan="1" colspan="1">Security model with non-vigilant juveniles</td>
<td align="left" rowspan="1" colspan="1">101.09</td>
<td align="left" rowspan="1" colspan="1">6.46</td>
<td align="left" rowspan="1" colspan="1">0.02</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">62</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<bold>b)</bold>
</td>
<td colspan="3" align="left" rowspan="1">
<bold>Non-reproductive females</bold>
</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">
<bold>1</bold>
</td>
<td align="left" rowspan="1" colspan="1">
<bold>Model 4</bold>
</td>
<td align="left" rowspan="1" colspan="1">
<bold>Security model with mothers with juveniles</bold>
</td>
<td align="left" rowspan="1" colspan="1">420.18</td>
<td align="left" rowspan="1" colspan="1">0.00</td>
<td align="left" rowspan="1" colspan="1">0.36</td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">286</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">2</td>
<td align="left" rowspan="1" colspan="1">Model 3</td>
<td align="left" rowspan="1" colspan="1">Security model with non-vigilant juveniles</td>
<td align="left" rowspan="1" colspan="1">421.00</td>
<td align="left" rowspan="1" colspan="1">0.83</td>
<td align="left" rowspan="1" colspan="1">0.24</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">287</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">3</td>
<td align="left" rowspan="1" colspan="1">Model 2</td>
<td align="left" rowspan="1" colspan="1">Security model</td>
<td align="left" rowspan="1" colspan="1">421.49</td>
<td align="left" rowspan="1" colspan="1">1.31</td>
<td align="left" rowspan="1" colspan="1">0.19</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">287</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">4</td>
<td align="left" rowspan="1" colspan="1">Model 6</td>
<td align="left" rowspan="1" colspan="1">LMI security model with mothers with juveniles</td>
<td align="left" rowspan="1" colspan="1">423.20</td>
<td align="left" rowspan="1" colspan="1">3.02</td>
<td align="left" rowspan="1" colspan="1">0.08</td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">286</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">Model 1</td>
<td align="left" rowspan="1" colspan="1">Detection model</td>
<td align="left" rowspan="1" colspan="1">423.44</td>
<td align="left" rowspan="1" colspan="1">3.26</td>
<td align="left" rowspan="1" colspan="1">0.07</td>
<td align="left" rowspan="1" colspan="1">4</td>
<td align="left" rowspan="1" colspan="1">288</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">Model 5</td>
<td align="left" rowspan="1" colspan="1">LMI security model</td>
<td align="left" rowspan="1" colspan="1">424.43</td>
<td align="left" rowspan="1" colspan="1">4.25</td>
<td align="left" rowspan="1" colspan="1">0.04</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">287</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<bold>c)</bold>
</td>
<td colspan="2" align="left" rowspan="1">
<bold>Males</bold>
</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">1</td>
<td align="left" rowspan="1" colspan="1">
<bold>Model 6</bold>
</td>
<td align="left" rowspan="1" colspan="1">
<bold>LMI security model with mothers with juveniles</bold>
</td>
<td align="left" rowspan="1" colspan="1">19.78</td>
<td align="left" rowspan="1" colspan="1">0.00</td>
<td align="left" rowspan="1" colspan="1">0.35</td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">15</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">2</td>
<td align="left" rowspan="1" colspan="1">
<bold>Model 2</bold>
</td>
<td align="left" rowspan="1" colspan="1">
<bold>Security model</bold>
</td>
<td align="left" rowspan="1" colspan="1">19.83</td>
<td align="left" rowspan="1" colspan="1">0.05</td>
<td align="left" rowspan="1" colspan="1">0.33</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">16</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">3</td>
<td align="left" rowspan="1" colspan="1">Model 4</td>
<td align="left" rowspan="1" colspan="1">Security model with mothers with juveniles</td>
<td align="left" rowspan="1" colspan="1">21.85</td>
<td align="left" rowspan="1" colspan="1">2.07</td>
<td align="left" rowspan="1" colspan="1">0.12</td>
<td align="left" rowspan="1" colspan="1">4</td>
<td align="left" rowspan="1" colspan="1">17</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">4</td>
<td align="left" rowspan="1" colspan="1">Model 1</td>
<td align="left" rowspan="1" colspan="1">Detection model</td>
<td align="left" rowspan="1" colspan="1">22.18</td>
<td align="left" rowspan="1" colspan="1">2.39</td>
<td align="left" rowspan="1" colspan="1">0.10</td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">15</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">Model 3</td>
<td align="left" rowspan="1" colspan="1">Security model with non-vigilant juveniles</td>
<td align="left" rowspan="1" colspan="1">22.92</td>
<td align="left" rowspan="1" colspan="1">3.16</td>
<td align="left" rowspan="1" colspan="1">0.07</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">16</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">6</td>
<td align="left" rowspan="1" colspan="1">Model 5</td>
<td align="left" rowspan="1" colspan="1">LMI security model</td>
<td align="left" rowspan="1" colspan="1">26.24</td>
<td align="left" rowspan="1" colspan="1">6.46</td>
<td align="left" rowspan="1" colspan="1">0.01</td>
<td align="left" rowspan="1" colspan="1">5</td>
<td align="left" rowspan="1" colspan="1">16</td>
</tr>
</tbody>
</table>
</alternatives>
<table-wrap-foot>
<fn id="nt102">
<label></label>
<p>The best-fitting model for each category is presented in bold.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<table-wrap id="pone-0044801-t003" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.t003</object-id>
<label>Table 3</label>
<caption>
<title>Parameters estimates for the selected best-fitting candidate models for a) females with dependant juveniles, b) females without juvenile and c) males.</title>
</caption>
<alternatives>
<graphic id="pone-0044801-t003-3" xlink:href="pone.0044801.t003"></graphic>
<table frame="hsides" rules="groups">
<colgroup span="1">
<col align="left" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
</colgroup>
<thead>
<tr>
<td colspan="3" align="left" rowspan="1">Parameter estimates</td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">a0</td>
<td align="left" rowspan="1" colspan="1">a1</td>
<td align="left" rowspan="1" colspan="1">a2</td>
<td align="left" rowspan="1" colspan="1">a3</td>
</tr>
</thead>
<tbody>
<tr>
<td colspan="10" align="left" rowspan="1">
<bold>a) Females accompanied</bold>
<bold>by dependant juveniles</bold>
</td>
</tr>
<tr>
<td colspan="3" align="left" rowspan="1">Model 2 - Security model</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">1.44</td>
<td align="left" rowspan="1" colspan="1">5.05</td>
<td align="left" rowspan="1" colspan="1">−8.07</td>
<td align="left" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td colspan="10" align="left" rowspan="1">
<bold>b) Non-reproductive females</bold>
</td>
</tr>
<tr>
<td colspan="6" align="left" rowspan="1">Model 4 - Security model with mothers accompanied by juveniles</td>
<td align="left" rowspan="1" colspan="1">−0.24</td>
<td align="left" rowspan="1" colspan="1">0.17</td>
<td align="left" rowspan="1" colspan="1">0.48</td>
<td align="left" rowspan="1" colspan="1">0.57</td>
</tr>
<tr>
<td colspan="10" align="left" rowspan="1">
<bold>c) Males</bold>
</td>
</tr>
<tr>
<td colspan="6" align="left" rowspan="1">Model 6 - LMI security model with mothers accompanied by juveniles</td>
<td align="left" rowspan="1" colspan="1">−0.94</td>
<td align="left" rowspan="1" colspan="1">−0.52</td>
<td align="left" rowspan="1" colspan="1">3.20</td>
<td align="left" rowspan="1" colspan="1">−12.16</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">or</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td colspan="3" align="left" rowspan="1">Model 2 - Security model</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">−0.94</td>
<td align="left" rowspan="1" colspan="1">−1.36</td>
<td align="left" rowspan="1" colspan="1">3.80</td>
<td align="left" rowspan="1" colspan="1"></td>
</tr>
</tbody>
</table>
</alternatives>
</table-wrap>
<p>When considering vigilance data for non-reproductive female kangaroos, the model with the lowest AICc value was the security model that accounted for the presence of mothers with juveniles (model 4) (
<xref ref-type="fig" rid="pone-0044801-g002">Figure 2</xref>
). However, the security model with non-vigilant juveniles (model 3) and the security model (model 2) also appeared to fit the vigilance data for non-reproductive females relatively well (
<xref ref-type="table" rid="pone-0044801-t002">Tables 2</xref>
and
<xref ref-type="table" rid="pone-0044801-t003">3</xref>
). Despite the level of uncertainty surrounding these three competing models, we considered the security model including females with juveniles (model 4), the model with the lowest AICc value, as the best-fitting model.</p>
<fig id="pone-0044801-g002" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.g002</object-id>
<label>Figure 2</label>
<caption>
<title>Changes in scanning rates (vigilant acts per minute) as a function of group size and number of juveniles for barren females according to model 4 (Security model with mothers accompanied by juveniles).</title>
</caption>
<graphic xlink:href="pone.0044801.g002"></graphic>
</fig>
<p>For the vigilance data for males, the LMI security model accounting for mothers with juveniles (model 6) had the lowest AICc value (
<xref ref-type="fig" rid="pone-0044801-g003">Figure 3</xref>
). However, the difference in AICc values between this and the second best-fitting model, the security model (model 2), was very small (ΔAICc model 6 vs. model 2 = 0.05) (
<xref ref-type="table" rid="pone-0044801-t002">Tables 2</xref>
and
<xref ref-type="table" rid="pone-0044801-t003">3</xref>
). Due to the high level of uncertainty surrounding these two candidate models, we could not arbitrary select the model with the lowest AICc value as the best candidate model and we interpret male vigilance tactic use in the light of these two best-fitting models.</p>
<fig id="pone-0044801-g003" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.g003</object-id>
<label>Figure 3</label>
<caption>
<title>Changes in scanning rates (vigilant acts per minute) as a function of group size, number of juveniles and number of males in the group for adult males according to model 6 (LMI security model with mothers accompanied by juveniles).</title>
</caption>
<graphic xlink:href="pone.0044801.g003"></graphic>
</fig>
<p>We found that all the selected models fitted the vigilance data significantly better than did the null model (
<xref ref-type="table" rid="pone-0044801-t004">Table 4</xref>
).</p>
<table-wrap id="pone-0044801-t004" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0044801.t004</object-id>
<label>Table 4</label>
<caption>
<title>Comparison between the best-fitting candidate models and a null model.</title>
</caption>
<alternatives>
<graphic id="pone-0044801-t004-4" xlink:href="pone.0044801.t004"></graphic>
<table frame="hsides" rules="groups">
<colgroup span="1">
<col align="left" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
<col align="center" span="1"></col>
</colgroup>
<thead>
<tr>
<td align="left" rowspan="1" colspan="1"></td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="center" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">Log-likelihood ratio test</td>
<td align="left" rowspan="1" colspan="1">df</td>
<td align="left" rowspan="1" colspan="1">
<italic>P</italic>
value</td>
</tr>
</thead>
<tbody>
<tr>
<td colspan="8" align="left" rowspan="1">
<bold>Best fitting model vs. null model</bold>
</td>
</tr>
<tr>
<td colspan="5" align="left" rowspan="1">a) Females accompanied by dependant juveniles</td>
<td align="left" rowspan="1" colspan="1">11.299</td>
<td align="left" rowspan="1" colspan="1">2</td>
<td align="left" rowspan="1" colspan="1">0.003</td>
</tr>
<tr>
<td colspan="3" align="left" rowspan="1">b) Non-reproductive females</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">8.621</td>
<td align="left" rowspan="1" colspan="1">3</td>
<td align="left" rowspan="1" colspan="1">0.034</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">c) Males</td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1"></td>
<td align="left" rowspan="1" colspan="1">12.222</td>
<td align="left" rowspan="1" colspan="1">3</td>
<td align="left" rowspan="1" colspan="1">0.006</td>
</tr>
</tbody>
</table>
</alternatives>
</table-wrap>
</sec>
<sec id="s4">
<title>Discussion</title>
<p>Although the classical group-size effect on vigilance has previously been reported for the eastern grey kangaroos
<xref ref-type="bibr" rid="pone.0044801-Pays1">[12]</xref>
,
<xref ref-type="bibr" rid="pone.0044801-PeterJ1">[31]</xref>
, our results revealed some subtle differences in the vigilance strategies used by the sexes. We found differences between the vigilance strategies used by reproductive and non-reproductive females, and between those used by non-reproductive females and adult males. Although female kangaroos relied on two distinct vigilance tactics depending on their reproductive status, we did not have clear evidence of the use of different strategies by adult males and females with young, perhaps due to small sample sizes for males. Two candidate models were found to explain the vigilance tactics used by males equally well: the LMI security model accounting for mothers with juveniles and the security model. We discuss this point in view of previous results published on this topic and potential differences between the sexes that might have influenced the evolution of their vigilance tactics.</p>
<sec id="s4a">
<title>Differences Among Females</title>
<p>Reproductive and non-reproductive females both relied on a combination of predator detection and risk dilution, but the latter adjusted their level of individual vigilance according to the proportion of females accompanied by juveniles within their group. Why do females differ in their vigilance tactic use? One of the main explanations is that mothers and non-mothers experience different costs of vigilance based on reproductive, physiological or nutritional trade-offs. Through experimental manipulation of reproduction in free-ranging eastern grey kangaroos using a fertility control agent, Cripps et al.
<xref ref-type="bibr" rid="pone.0044801-Cripps1">[38]</xref>
demonstrated that, although reproductive females did not reduce the time spent in anti-predator vigilance, females altered their behaviour in direct response to the energetic demands of reproduction. Reproductive females increased their bite rates, and thus food intake, when the energetic demands of lactation were highest. Reproduction is expected to be very costly in female eastern grey kangaroos because of their reproductive patterns
<xref ref-type="bibr" rid="pone.0044801-Jarman2">[39]</xref>
. At a very underdeveloped stage, a young born weighing around one gram finds its way into the pouch, attaches permanently to a nipple and continues to develop until four or five months, at which point the juvenile starts to leave the pouch for short periods of time. It is only around 10.5 months that the juvenile leaves the pouch permanently; this corresponds to the time when the mother gives birth again. The young-at-foot continues to nurse for approximately six months. Therefore, for about six months a reproductive female simultaneously provides milk to a pouch-young and a young-at-foot. Consequently many adult females invest continuously in lactation as well as devoting attention to dependent young outside the pouch.</p>
<p>In semi-arid environments, where food availability and quality change dramatically due to unreliable rainfall, kangaroos’ intake rates have been found to vary with vegetation biomass
<xref ref-type="bibr" rid="pone.0044801-Short1">[40]</xref>
. Under such environmental conditions, reproductive females may face a severe trade-off between time invested in meeting their nutritional requirements and those of their offspring versus other fitness-enhancing activities such as social or anti-predator vigilance. In contrast, non-reproductive females, as well as adult males, are free from such parental investment.</p>
<p>In an early attempt to separate the effect of the two mechanisms (improved predator detection versus risk dilution) on vigilance in a species with strong sexual segregation, Rieucau and Martin
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
found that female bighorn sheep (
<italic>O. canadensis</italic>
) rely on two distinct anti-predator tactics as the size of their group increases, depending on their reproductive status. Lactating females decreased their vigilance due to increased predator detection while non-reproductive bighorn sheep ewes decreased their individual vigilance as a function of the proportion of mothers accompanied by lambs, apparently exploiting the extra vigilance of lactating ewes. Interestingly, the similarity between bighorn sheep and eastern grey kangaroos in the differential use of vigilance tactics by females, depending on their reproductive states, suggests that the investment in vigilance of same sex group members can be unequal because some individuals exploit the supplemental predator detection effort provided by others. In light of this result, it thus appears important to take into account the possible presence of “cheaters” within a group
<xref ref-type="bibr" rid="pone.0044801-Rieucau2">[19]</xref>
when exploring collective vigilance to clearly understand how individuals’ safety is achieved in gregarious animal species.</p>
</sec>
<sec id="s4b">
<title>Between-sex Differences</title>
<p>We found that two candidate models explained males’ vigilance tactic use equally well: the LMI security model accounting for mothers with juveniles (model 6) and the security model (model 2). Due to the level of uncertainty surrounding the selection of these two models care must be taken when interpreting our results. The two best candidate models both combined risk dilution and collective detection but only the former (which had a marginally lower AICc value) considers that only females with juveniles act as efficient predator detectors and that males and juveniles do not participate in the detection. This may suggest that males rely on predator detection and dilution of risk (as did females – the security model) but may also adjust their vigilance effort according to the proportion of reproductive females within a group. The small number of males sampled during this study cannot allow us to clearly distinguish between these two models. Further studies are thus needed to firmly ascertain whether male eastern grey kangaroos use a different vigilance tactic than females when foraging in mixed-sex groups and if they take advantage of the extra-vigilance effort provided by females with juveniles (as possibly suggested by model 6).</p>
<p>Differential vulnerability may cause sex-dependent vigilance tactic use in this dimorphic species. Adult males, which suffer a low predation pressure due to their large body sizes, may reduce their individual vigilance effort when surrounded by female group mates for whom predation risk is higher because of their smaller body sizes
<xref ref-type="bibr" rid="pone.0044801-Pays2">[22]</xref>
. Childress and Lung
<xref ref-type="bibr" rid="pone.0044801-Childress1">[21]</xref>
showed that female elk (
<italic>Cervus elaphus</italic>
) with calves are preferentially targeted by wolves (
<italic>Canis lupis</italic>
) and are consequently the more vigilant age-sex class. Although grouping is generally thought to reduce the likelihood of being killed during an attack, the presence of males that do little to contribute to the anti-predator detection power of the group and are less targeted by predators may cause additional security costs to females. Pays and Jarman
<xref ref-type="bibr" rid="pone.0044801-Pays2">[22]</xref>
previously reported that males eastern grey kangaroos were individually less vigilant than females when groups were composed of both sexes. Moreover, they found that the vigilance of females was not affected by the presence of males within groups, suggesting that females did not perceive males as taking part in predator scanning or acting as effective dilution agents.</p>
<p>Unfortunately we lack information about the direction of vigilance scans in our study and therefore we cannot separate the different functions of vigilance (anti-predator or social) for each sex category. The set of candidate models used in this study assumes that vigilance is only driven by anti-predator considerations. Previous studies in eastern grey kangaroos have reported that females in single sex groups spend between 20% to 30% of their vigilant time in social vigilance
<xref ref-type="bibr" rid="pone.0044801-Favreau1">[13]</xref>
. As males experience lower predation risk, it is reasonable to assume that they can spend more time in social vigilance than females. However, we cannot estimate from our data the proportion of time that males devoted to monitoring conspecifics (females or rivals) when in mixed-sex groups. Males should watch for oestrous females to try to attain copulations and defend oestrous females against other male rivals. In order to better understand the causes of the differences in vigilance levels and tactics used between males and females, further effort has to be directed to the development of models that predict how social vigilance may affect the observed vigilance patterns.</p>
<p>We hope that our results will encourage researchers to pursue the investigation of differences among group members in the vigilance tactics employed and the basis of such inter-individual differences. We should now reexamine the classical view of the safety advantages providing by grouping to provide a better understanding of the mechanisms and functions of gregariousness. A further achievement would be the inclusion of social vigilance into the different candidate models to accurately predict vigilance patterns of group living animals.</p>
</sec>
</sec>
</body>
<back>
<ack>
<p>The field research on kangaroos was approved by the University of Queensland’s Native and Exotic Wildlife and Marine Animals ethics committee and a Scientific Purposes Permit from Queensland’s Department of Environment and Resource Management. We thank Peter Hasselgrove and Ian Elms, rangers at Sundown National Park, for their support of this work.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="pone.0044801-Krebs1">
<label>1</label>
<mixed-citation publication-type="other">Krebs JR, Davies NB (1993) An introduction to behavioural ecology. Oxford: Blackwell Science.</mixed-citation>
</ref>
<ref id="pone.0044801-Caro1">
<label>2</label>
<mixed-citation publication-type="other">Caro T (2005) Antipredator defenses in birds and mammals: University of Chicago Press.</mixed-citation>
</ref>
<ref id="pone.0044801-Lima1">
<label>3</label>
<mixed-citation publication-type="journal">
<name>
<surname>Lima</surname>
<given-names>SL</given-names>
</name>
(
<year>1995</year>
)
<article-title>Back to the basics of anti-predatory vigilance: the group-size effect</article-title>
.
<source>Animal Behaviour</source>
<volume>49</volume>
:
<fpage>11</fpage>
<lpage>20</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Pulliam1">
<label>4</label>
<mixed-citation publication-type="journal">
<name>
<surname>Pulliam</surname>
<given-names>HR</given-names>
</name>
(
<year>1973</year>
)
<article-title>On the advantages of flocking</article-title>
.
<source>Journal of Theoretical Biology</source>
<volume>38</volume>
:
<fpage>419</fpage>
<lpage>422</lpage>
<pub-id pub-id-type="pmid">4734745</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0044801-Pulliam2">
<label>5</label>
<mixed-citation publication-type="journal">
<name>
<surname>Pulliam</surname>
<given-names>HR</given-names>
</name>
,
<name>
<surname>Pyke</surname>
<given-names>GH</given-names>
</name>
,
<name>
<surname>Caraco</surname>
<given-names>T</given-names>
</name>
(
<year>1982</year>
)
<article-title>The scanning behavior of juncos: A game-theoretical approach</article-title>
.
<source>Journal of Theoretical Biology</source>
<volume>95</volume>
:
<fpage>89</fpage>
<lpage>103</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Lima2">
<label>6</label>
<mixed-citation publication-type="journal">
<name>
<surname>Lima</surname>
<given-names>SL</given-names>
</name>
,
<name>
<surname>Dill</surname>
<given-names>LM</given-names>
</name>
(
<year>1990</year>
)
<article-title>Behavioral decisions made under the risk of predation: a review and prospectus</article-title>
.
<source>Canadian Journal of Zoology</source>
<volume>68</volume>
:
<fpage>619</fpage>
<lpage>640</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Lima3">
<label>7</label>
<mixed-citation publication-type="journal">
<name>
<surname>Lima</surname>
<given-names>SL</given-names>
</name>
(
<year>1998</year>
)
<article-title>Nonlethal effects in the ecology of predator-prey interactions</article-title>
.
<source>BioScience</source>
<volume>48</volume>
:
<fpage>25</fpage>
<lpage>34</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Lima4">
<label>8</label>
<mixed-citation publication-type="journal">
<name>
<surname>Lima</surname>
<given-names>SL</given-names>
</name>
,
<name>
<surname>Zollner</surname>
<given-names>PA</given-names>
</name>
,
<name>
<surname>Bednekoff</surname>
<given-names>PA</given-names>
</name>
(
<year>1999</year>
)
<article-title>Predation, scramble competition, and the vigilance group size effect in dark-eyed juncos (
<italic>Junco hyemalis)</italic>
</article-title>
.
<source>Behavioral Ecology and Sociobiology</source>
<volume>46</volume>
:
<fpage>110</fpage>
<lpage>116</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Duncan1">
<label>9</label>
<mixed-citation publication-type="journal">
<name>
<surname>Duncan</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Foose</surname>
<given-names>TJ</given-names>
</name>
,
<name>
<surname>Gordon</surname>
<given-names>IJ</given-names>
</name>
,
<name>
<surname>Gakahu</surname>
<given-names>CG</given-names>
</name>
,
<name>
<surname>Lloyd</surname>
<given-names>M</given-names>
</name>
(
<year>1990</year>
)
<article-title>Comparative nutrient extraction from forages by grazing bovids and equids: a test of the nutritional model of equid/bovid competition and coexistence</article-title>
.
<source>Oecologia</source>
<volume>84</volume>
:
<fpage>411</fpage>
<lpage>418</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Fortin1">
<label>10</label>
<mixed-citation publication-type="journal">
<name>
<surname>Fortin</surname>
<given-names>D</given-names>
</name>
,
<name>
<surname>Boyce</surname>
<given-names>MS</given-names>
</name>
,
<name>
<surname>Merrill</surname>
<given-names>EH</given-names>
</name>
,
<name>
<surname>Fryxell</surname>
<given-names>JM</given-names>
</name>
(
<year>2004</year>
)
<article-title>Foraging costs of vigilance in large mammalian herbivores</article-title>
.
<source>Oikos</source>
<volume>107</volume>
:
<fpage>172</fpage>
<lpage>180</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-FernndezJuricic1">
<label>11</label>
<mixed-citation publication-type="journal">
<name>
<surname>Fernández-Juricic</surname>
<given-names>E</given-names>
</name>
,
<name>
<surname>Kacelnik</surname>
<given-names>A</given-names>
</name>
(
<year>2004</year>
)
<article-title>Information transfer and gain in flocks: the effects of quality and quantity of social information at different neighbour distances</article-title>
.
<source>Behavioral Ecology and Sociobiology</source>
<volume>55</volume>
:
<fpage>502</fpage>
<lpage>511</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Pays1">
<label>12</label>
<mixed-citation publication-type="journal">
<name>
<surname>Pays</surname>
<given-names>O</given-names>
</name>
,
<name>
<surname>Renaud</surname>
<given-names>P-C</given-names>
</name>
,
<name>
<surname>Loisel</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Petit</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Gerard</surname>
<given-names>J-F</given-names>
</name>
,
<etal>et al</etal>
(
<year>2007</year>
)
<article-title>Prey synchronize their vigilant behaviour with other group members</article-title>
.
<source>Proceedings of the Royal Society B: Biological Sciences</source>
<volume>274</volume>
:
<fpage>1287</fpage>
<lpage>1291</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Favreau1">
<label>13</label>
<mixed-citation publication-type="journal">
<name>
<surname>Favreau</surname>
<given-names>F-R</given-names>
</name>
,
<name>
<surname>Goldizen</surname>
<given-names>AW</given-names>
</name>
,
<name>
<surname>Pays</surname>
<given-names>O</given-names>
</name>
(
<year>2010</year>
)
<article-title>Interactions among social monitoring, anti-predator vigilance and group size in eastern grey kangaroos</article-title>
.
<source>Proceedings of the Royal Society B: Biological Sciences</source>
<volume>277</volume>
:
<fpage>2089</fpage>
<lpage>2095</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Michelena1">
<label>14</label>
<mixed-citation publication-type="journal">
<name>
<surname>Michelena</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Deneubourg</surname>
<given-names>J-L</given-names>
</name>
(
<year>2011</year>
)
<article-title>How group size affects vigilance dynamics and time allocation patterns: The key role of imitation and tempo</article-title>
.
<source>PLoS ONE</source>
<volume>6</volume>
:
<fpage>e18631</fpage>
<pub-id pub-id-type="pmid">21525987</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0044801-Beauchamp1">
<label>15</label>
<mixed-citation publication-type="journal">
<name>
<surname>Beauchamp</surname>
<given-names>G</given-names>
</name>
(
<year>2008</year>
)
<article-title>What is the magnitude of the group-size effect on vigilance?</article-title>
<source>Behavioral Ecology</source>
<volume>19</volume>
:
<fpage>1361</fpage>
<lpage>1368</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Carter1">
<label>16</label>
<mixed-citation publication-type="journal">
<name>
<surname>Carter</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Pays</surname>
<given-names>O</given-names>
</name>
,
<name>
<surname>Goldizen</surname>
<given-names>A</given-names>
</name>
(
<year>2009</year>
)
<article-title>Individual variation in the relationship between vigilance and group size in eastern grey kangaroos</article-title>
.
<source>Behavioral Ecology and Sociobiology</source>
<volume>64</volume>
:
<fpage>237</fpage>
<lpage>245</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Rieucau1">
<label>17</label>
<mixed-citation publication-type="journal">
<name>
<surname>Rieucau</surname>
<given-names>G</given-names>
</name>
,
<name>
<surname>Morand-Ferron</surname>
<given-names>J</given-names>
</name>
,
<name>
<surname>Giraldeau</surname>
<given-names>L-A</given-names>
</name>
(
<year>2010</year>
)
<article-title>Group size effect in nutmeg mannikin: between-individuals behavioral differences but same plasticity</article-title>
.
<source>Behavioral Ecology</source>
<volume>21</volume>
:
<fpage>684</fpage>
<lpage>689</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Lung1">
<label>18</label>
<mixed-citation publication-type="journal">
<name>
<surname>Lung</surname>
<given-names>MA</given-names>
</name>
,
<name>
<surname>Childress</surname>
<given-names>MJ</given-names>
</name>
(
<year>2007</year>
)
<article-title>The influence of conspecifics and predation risk on the vigilance of elk (
<italic>Cervus elaphus</italic>
) in Yellowstone National Park</article-title>
.
<source>Behavioral Ecology</source>
<volume>18</volume>
:
<fpage>12</fpage>
<lpage>20</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Rieucau2">
<label>19</label>
<mixed-citation publication-type="journal">
<name>
<surname>Rieucau</surname>
<given-names>G</given-names>
</name>
,
<name>
<surname>Martin</surname>
<given-names>JGA</given-names>
</name>
(
<year>2008</year>
)
<article-title>Many eyes or many ewes: vigilance tactics in female bighorn sheep (
<italic>Ovis canadensis</italic>
) vary according to reproductive status</article-title>
.
<source>Oikos</source>
<volume>117</volume>
:
<fpage>501</fpage>
<lpage>506</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-ClareD1">
<label>20</label>
<mixed-citation publication-type="journal">
<name>
<surname>Clare D</surname>
<given-names>F</given-names>
</name>
(
<year>1990</year>
)
<article-title>Why do hunting cheetahs prefer male gazelles?</article-title>
<source>Animal Behaviour</source>
<volume>40</volume>
:
<fpage>837</fpage>
<lpage>845</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Childress1">
<label>21</label>
<mixed-citation publication-type="journal">
<name>
<surname>Childress</surname>
<given-names>MJ</given-names>
</name>
,
<name>
<surname>Lung</surname>
<given-names>MA</given-names>
</name>
(
<year>2003</year>
)
<article-title>Predation risk, gender and the group size effect: does elk vigilance depend upon the behaviour of conspecifics?</article-title>
<source>Animal Behaviour</source>
<volume>66</volume>
:
<fpage>389</fpage>
<lpage>398</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Pays2">
<label>22</label>
<mixed-citation publication-type="journal">
<name>
<surname>Pays</surname>
<given-names>O</given-names>
</name>
,
<name>
<surname>Jarman</surname>
<given-names>P</given-names>
</name>
(
<year>2008</year>
)
<article-title>Does sex affect both individual and collective vigilance in social mammalian herbivores: the case of the eastern grey kangaroo?</article-title>
<source>Behavioral Ecology and Sociobiology</source>
<volume>62</volume>
:
<fpage>757</fpage>
<lpage>767</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Blanchard1">
<label>23</label>
<mixed-citation publication-type="journal">
<name>
<surname>Blanchard</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Sabatier</surname>
<given-names>R</given-names>
</name>
,
<name>
<surname>Fritz</surname>
<given-names>H</given-names>
</name>
(
<year>2008</year>
)
<article-title>Within-group spatial position and vigilance: a role also for competition? The case of impalas (
<italic>Aepyceros melampus</italic>
) with a controlled food supply</article-title>
.
<source>Behavioral Ecology and Sociobiology</source>
<volume>62</volume>
:
<fpage>1863</fpage>
<lpage>1868</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Quinn1">
<label>24</label>
<mixed-citation publication-type="journal">
<name>
<surname>Quinn</surname>
<given-names>JL</given-names>
</name>
,
<name>
<surname>Cresswell</surname>
<given-names>W</given-names>
</name>
(
<year>2005</year>
)
<article-title>Personality, anti-predation behaviour and behavioural plasticity in the chaffinch
<italic>Fringilla coelebs</italic>
</article-title>
.
<source>Behaviour</source>
<volume>142</volume>
:
<fpage>1377</fpage>
<lpage>1402</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Lpez1">
<label>25</label>
<mixed-citation publication-type="journal">
<name>
<surname>López</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Hawlena</surname>
<given-names>D</given-names>
</name>
,
<name>
<surname>Polo</surname>
<given-names>V</given-names>
</name>
,
<name>
<surname>Amo</surname>
<given-names>L</given-names>
</name>
,
<name>
<surname>Martín</surname>
<given-names>J</given-names>
</name>
(
<year>2005</year>
)
<article-title>Sources of individual shy–bold variations in antipredator behaviour of male Iberian rock lizards</article-title>
.
<source>Animal Behaviour</source>
<volume>69</volume>
:
<fpage>1</fpage>
<lpage>9</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Ruckstuhl1">
<label>26</label>
<mixed-citation publication-type="journal">
<name>
<surname>Ruckstuhl</surname>
<given-names>KE</given-names>
</name>
,
<name>
<surname>Neuhaus</surname>
<given-names>P</given-names>
</name>
(
<year>2002</year>
)
<article-title>Sexual segregation in ungulates: a comparative test of three hypotheses</article-title>
.
<source>Biological Reviews</source>
<volume>77</volume>
:
<fpage>77</fpage>
<lpage>96</lpage>
<pub-id pub-id-type="pmid">11911375</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0044801-Michelena2">
<label>27</label>
<mixed-citation publication-type="journal">
<name>
<surname>Michelena</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Bouquet</surname>
<given-names>PM</given-names>
</name>
,
<name>
<surname>Dissac</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Fourcassie</surname>
<given-names>V</given-names>
</name>
,
<name>
<surname>Lauga</surname>
<given-names>J</given-names>
</name>
,
<etal>et al</etal>
(
<year>2004</year>
)
<article-title>An experimental test of hypotheses explaining social segregation in dimorphic ungulates</article-title>
.
<source>Animal Behaviour</source>
<volume>68</volume>
:
<fpage>1371</fpage>
<lpage>1380</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Fairbanks1">
<label>28</label>
<mixed-citation publication-type="journal">
<name>
<surname>Fairbanks</surname>
<given-names>B</given-names>
</name>
,
<name>
<surname>Dobson</surname>
<given-names>FS</given-names>
</name>
(
<year>2007</year>
)
<article-title>Mechanisms of the group-size effect on vigilance in Columbian ground squirrels: dilution versus detection</article-title>
.
<source>Animal Behaviour</source>
<volume>73</volume>
:
<fpage>115</fpage>
<lpage>123</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Carter2">
<label>29</label>
<mixed-citation publication-type="journal">
<name>
<surname>Carter</surname>
<given-names>AJ</given-names>
</name>
,
<name>
<surname>Macdonald</surname>
<given-names>SL</given-names>
</name>
,
<name>
<surname>Thomson</surname>
<given-names>VA</given-names>
</name>
,
<name>
<surname>Goldizen</surname>
<given-names>AW</given-names>
</name>
(
<year>2009</year>
)
<article-title>Structured association patterns and their energetic benefits in female eastern grey kangaroos, Macropus giganteus</article-title>
.
<source>Animal Behaviour</source>
<volume>77</volume>
:
<fpage>839</fpage>
<lpage>846</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Jarman1">
<label>30</label>
<mixed-citation publication-type="other">Jarman PJ (1989) Sexual dimorphism in Macropodoidea. In: Grigg G JP, Hume I editor. Kangaroos, wallabies and rat-kangaroos: Surrey Beatty, Chipping Norton. 433–447.</mixed-citation>
</ref>
<ref id="pone.0044801-PeterJ1">
<label>31</label>
<mixed-citation publication-type="journal">
<name>
<surname>Peter J</surname>
<given-names>J</given-names>
</name>
(
<year>1987</year>
)
<article-title>Group size and activity in eastern grey kangaroos</article-title>
.
<source>Animal Behaviour</source>
<volume>35</volume>
:
<fpage>1044</fpage>
<lpage>1050</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Pays3">
<label>32</label>
<mixed-citation publication-type="journal">
<name>
<surname>Pays</surname>
<given-names>O</given-names>
</name>
,
<name>
<surname>Goulard</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Blomberg</surname>
<given-names>SP</given-names>
</name>
,
<name>
<surname>Goldizen</surname>
<given-names>AW</given-names>
</name>
,
<name>
<surname>Sirot</surname>
<given-names>E</given-names>
</name>
,
<etal>et al</etal>
(
<year>2009</year>
)
<article-title>The effect of social facilitation on vigilance in the eastern gray kangaroo, Macropus giganteus</article-title>
.
<source>Behavioral Ecology</source>
<volume>20</volume>
:
<fpage>469</fpage>
<lpage>477</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Dehn1">
<label>33</label>
<mixed-citation publication-type="journal">
<name>
<surname>Dehn</surname>
<given-names>M</given-names>
</name>
(
<year>1990</year>
)
<article-title>Vigilance for predators: detection and dilution effects</article-title>
.
<source>Behavioral Ecology and Sociobiology</source>
<volume>26</volume>
:
<fpage>337</fpage>
<lpage>342</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Colagross1">
<label>34</label>
<mixed-citation publication-type="journal">
<name>
<surname>Colagross</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Cockburn</surname>
<given-names>A</given-names>
</name>
(
<year>1993</year>
)
<article-title>Vigilance and Grouping in the Eastern Gray Kangaroo, Macropus giganteus</article-title>
.
<source>Australian Journal of Zoology</source>
<volume>41</volume>
:
<fpage>325</fpage>
<lpage>334</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Burnham1">
<label>35</label>
<mixed-citation publication-type="other">Burnham KP, Anderson DR (2002) Model selection and multi-model inference: a practical information-theoretic approach: Springer.</mixed-citation>
</ref>
<ref id="pone.0044801-Hurvich1">
<label>36</label>
<mixed-citation publication-type="journal">
<name>
<surname>Hurvich</surname>
<given-names>CM</given-names>
</name>
,
<name>
<surname>Tsai</surname>
<given-names>C-L</given-names>
</name>
(
<year>1989</year>
)
<article-title>Regression and time series model selection in small samples</article-title>
.
<source>Biometrika</source>
<volume>76</volume>
:
<fpage>297</fpage>
<lpage>307</lpage>
</mixed-citation>
</ref>
<ref id="pone.0044801-Blumstein1">
<label>37</label>
<mixed-citation publication-type="journal">
<name>
<surname>Blumstein</surname>
<given-names>DT</given-names>
</name>
,
<name>
<surname>Lea</surname>
<given-names>AJ</given-names>
</name>
,
<name>
<surname>Olson</surname>
<given-names>LE</given-names>
</name>
,
<name>
<surname>Martin</surname>
<given-names>JGA</given-names>
</name>
(
<year>2010</year>
)
<article-title>Heritability of anti-predatory traits: vigilance and locomotor performance in marmots</article-title>
.
<source>Journal of Evolutionary Biology</source>
<volume>23</volume>
:
<fpage>879</fpage>
<lpage>887</lpage>
<pub-id pub-id-type="pmid">20298440</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0044801-Cripps1">
<label>38</label>
<mixed-citation publication-type="journal">
<name>
<surname>Cripps</surname>
<given-names>JK</given-names>
</name>
,
<name>
<surname>Wilson</surname>
<given-names>ME</given-names>
</name>
,
<name>
<surname>Elgar</surname>
<given-names>MA</given-names>
</name>
,
<name>
<surname>Coulson</surname>
<given-names>G</given-names>
</name>
(
<year>2011</year>
)
<article-title>Experimental manipulation of fertility reveals potential lactation costs in a free-ranging marsupial</article-title>
.
<source>Biology Letters</source>
<volume>7</volume>
:
<fpage>859</fpage>
<lpage>862</lpage>
<pub-id pub-id-type="pmid">21733874</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0044801-Jarman2">
<label>39</label>
<mixed-citation publication-type="other">Jarman PJ, Southwell CJ (1986) Grouping, associations and reproductive strategies in eastern grey kangaroos. In: Rubenstein DI WR, editor. Ecological aspects of social evolution: birds and mammals: Princeton University Press, Princeton, New Jersey,. 399–428.</mixed-citation>
</ref>
<ref id="pone.0044801-Short1">
<label>40</label>
<mixed-citation publication-type="journal">
<name>
<surname>Short</surname>
<given-names>J</given-names>
</name>
(
<year>1985</year>
)
<article-title>The functional response of kangaroos, sheep and rabbits in an arid grazing system</article-title>
.
<source>Journal of Applied Ecology</source>
<volume>22</volume>
:
<fpage>435</fpage>
<lpage>447</lpage>
</mixed-citation>
</ref>
</ref-list>
</back>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002A410 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 002A410 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     
   |texte=   
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024