Limits...
Sequential phenotypic constraints on social information use in wild baboons.

Carter AJ, Torrents Ticó M, Cowlishaw G - Elife (2016)

Bottom Line: However, an individual's ability to use information is likely to be dependent on phenotypic constraints operating at three successive steps: acquisition, application, and exploitation.We identified phenotypic constraints at each step of the information use sequence: peripheral individuals in the proximity network were less likely to acquire and apply social information, while subordinate females were less likely to exploit it successfully.As a result of these constraints, the average individual only acquired and exploited social information on.

View Article: PubMed Central - PubMed

Affiliation: Department of Zoology, University of Cambridge, Cambridge, United Kingdom.

ABSTRACT
Social information allows the rapid dissemination of novel information among individuals. However, an individual's ability to use information is likely to be dependent on phenotypic constraints operating at three successive steps: acquisition, application, and exploitation. We tested this novel framework by quantifying the sequential process of social information use with experimental food patches in wild baboons (Papio ursinus). We identified phenotypic constraints at each step of the information use sequence: peripheral individuals in the proximity network were less likely to acquire and apply social information, while subordinate females were less likely to exploit it successfully. Social bonds and personality also played a limiting role along the sequence. As a result of these constraints, the average individual only acquired and exploited social information on.

No MeSH data available.


Related in: MedlinePlus

The relationships between social network centrality and successive steps of the social information process.The relationships between social information (c, d) acquired, (e) applied and (f) exploited by wild baboons and their degree strengths in the social networks. Presented are the proximity networks from which degree strengths were calculated for (a) J and (b) L troops, where nodes represent individuals, node size represents the rank of the individual, and node luminance represents the number of times the individual acquired information (darker nodes acquired social information on more occasions; this colouration is conserved throughout the figure). Lines connecting nodes represent the strengths of the connections between dyads where thicker lines are stronger connections (see legend). Presented below the networks is the relationship between (c, d) social information acquired in (c) J and (d) L troops, (e) social information applied and (f) social information exploited (both troops plotted together).DOI:http://dx.doi.org/10.7554/eLife.13125.016
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4829417&req=5

fig3: The relationships between social network centrality and successive steps of the social information process.The relationships between social information (c, d) acquired, (e) applied and (f) exploited by wild baboons and their degree strengths in the social networks. Presented are the proximity networks from which degree strengths were calculated for (a) J and (b) L troops, where nodes represent individuals, node size represents the rank of the individual, and node luminance represents the number of times the individual acquired information (darker nodes acquired social information on more occasions; this colouration is conserved throughout the figure). Lines connecting nodes represent the strengths of the connections between dyads where thicker lines are stronger connections (see legend). Presented below the networks is the relationship between (c, d) social information acquired in (c) J and (d) L troops, (e) social information applied and (f) social information exploited (both troops plotted together).DOI:http://dx.doi.org/10.7554/eLife.13125.016

Mentions: The rules were the 5 m chain rule (5 m), 10 m proximity (10 m), directed nearest neighbour (NN), directed grooming interactions (groom) and directed dominance interactions (dom). Colouration is conserved from Figures 2 and 3, where J troop is represented by purple points and L troops by green points, and point luminance represents the number of times the individual acquired information (darker nodes acquired social information on more occasions).


Sequential phenotypic constraints on social information use in wild baboons.

Carter AJ, Torrents Ticó M, Cowlishaw G - Elife (2016)

The relationships between social network centrality and successive steps of the social information process.The relationships between social information (c, d) acquired, (e) applied and (f) exploited by wild baboons and their degree strengths in the social networks. Presented are the proximity networks from which degree strengths were calculated for (a) J and (b) L troops, where nodes represent individuals, node size represents the rank of the individual, and node luminance represents the number of times the individual acquired information (darker nodes acquired social information on more occasions; this colouration is conserved throughout the figure). Lines connecting nodes represent the strengths of the connections between dyads where thicker lines are stronger connections (see legend). Presented below the networks is the relationship between (c, d) social information acquired in (c) J and (d) L troops, (e) social information applied and (f) social information exploited (both troops plotted together).DOI:http://dx.doi.org/10.7554/eLife.13125.016
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4829417&req=5

fig3: The relationships between social network centrality and successive steps of the social information process.The relationships between social information (c, d) acquired, (e) applied and (f) exploited by wild baboons and their degree strengths in the social networks. Presented are the proximity networks from which degree strengths were calculated for (a) J and (b) L troops, where nodes represent individuals, node size represents the rank of the individual, and node luminance represents the number of times the individual acquired information (darker nodes acquired social information on more occasions; this colouration is conserved throughout the figure). Lines connecting nodes represent the strengths of the connections between dyads where thicker lines are stronger connections (see legend). Presented below the networks is the relationship between (c, d) social information acquired in (c) J and (d) L troops, (e) social information applied and (f) social information exploited (both troops plotted together).DOI:http://dx.doi.org/10.7554/eLife.13125.016
Mentions: The rules were the 5 m chain rule (5 m), 10 m proximity (10 m), directed nearest neighbour (NN), directed grooming interactions (groom) and directed dominance interactions (dom). Colouration is conserved from Figures 2 and 3, where J troop is represented by purple points and L troops by green points, and point luminance represents the number of times the individual acquired information (darker nodes acquired social information on more occasions).

Bottom Line: However, an individual's ability to use information is likely to be dependent on phenotypic constraints operating at three successive steps: acquisition, application, and exploitation.We identified phenotypic constraints at each step of the information use sequence: peripheral individuals in the proximity network were less likely to acquire and apply social information, while subordinate females were less likely to exploit it successfully.As a result of these constraints, the average individual only acquired and exploited social information on.

View Article: PubMed Central - PubMed

Affiliation: Department of Zoology, University of Cambridge, Cambridge, United Kingdom.

ABSTRACT
Social information allows the rapid dissemination of novel information among individuals. However, an individual's ability to use information is likely to be dependent on phenotypic constraints operating at three successive steps: acquisition, application, and exploitation. We tested this novel framework by quantifying the sequential process of social information use with experimental food patches in wild baboons (Papio ursinus). We identified phenotypic constraints at each step of the information use sequence: peripheral individuals in the proximity network were less likely to acquire and apply social information, while subordinate females were less likely to exploit it successfully. Social bonds and personality also played a limiting role along the sequence. As a result of these constraints, the average individual only acquired and exploited social information on.

No MeSH data available.


Related in: MedlinePlus