Wasps Use Social Eavesdropping to Learn about Individual Rivals.

Curr Biol

Ecology and Evolutionary Biology, University of Michigan, Ann Arbor, MI, USA.

Published: August 2020

Many animals minimize the costs of conflict by using social eavesdropping to learn about the fighting ability of potential rivals before they interact. Learning about individual conspecifics via social eavesdropping allows individuals to assess potential opponents without personal risk. However, keeping track of a network of individually differentiated social relationships is thought to be cognitively challenging. Here, we test how Polistes fuscatus nest-founding queens use social eavesdropping to assess individual rivals. Bystanders watched conspecifics fight through a clear partition. Then, bystanders were allowed to interact with fighters. Bystander behavior toward fighters was strongly influenced by the observed fight; bystanders were less aggressive toward fighters that were seen to initiate more and receive less aggression. Control trials allow us to reject alternative explanations for the link between observed aggression and bystander behavior, including priming or winner/loser effects. Therefore, P. fuscatus wasps observe and remember a complex network of social interactions between individual conspecifics rather than only paying attention to individuals they interact with directly. Wasps have an impressive capacity to learn, remember, and make social deductions about individuals. These results indicate that insects can have surprisingly complex social lives involving a network of individually differentiated social relationships.

Download full-text PDF

Source
http://dx.doi.org/10.1016/j.cub.2020.05.053DOI Listing

Publication Analysis

Top Keywords

social eavesdropping
16
eavesdropping learn
8
individual rivals
8
social
8
individual conspecifics
8
network individually
8
individually differentiated
8
differentiated social
8
social relationships
8
bystander behavior
8

Similar Publications

A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters.

PeerJ Comput Sci

August 2024

The Custodian of the Two Holy Mosques Institute for Hajj and Umrah Research, Umm Al-Qura University, Makkah, Saudi Arabia.

Mega events attract mega crowds, and many data exchange transactions are involved among organizers, stakeholders, and individuals, which increase the risk of covert eavesdropping. Data hiding is essential for safeguarding the security, confidentiality, and integrity of information during mega events. It plays a vital role in reducing cyber risks and ensuring the seamless execution of these extensive gatherings.

View Article and Find Full Text PDF

This article explores detecting and categorizing network traffic data using machine-learning (ML) methods, specifically focusing on the Domain Name Server (DNS) protocol. DNS has long been susceptible to various security flaws, frequently exploited over time, making DNS abuse a major concern in cybersecurity. Despite advanced attack, tactics employed by attackers to steal data in real-time, ensuring security and privacy for DNS queries and answers remains challenging.

View Article and Find Full Text PDF

Auditory risk recognition is socially transmitted across territory borders in wild birds.

Anim Cogn

March 2024

Faculty of Biology, Forest Biology Center, Adam Mickiewicz University, Uniwersytetu Poznańskiego 6, 61-614, Poznan, Poland.

Prey species commonly assess predation risk based on acoustic signals, such as predator vocalizations or heterospecific alarm calls. The resulting risk-sensitive decision-making affects not only the behavior and life-history of individual prey, but also has far-reaching ecological consequences for population, community, and ecosystem dynamics. Although auditory risk recognition is ubiquitous in animals, it remains unclear how individuals gain the ability to recognize specific sounds as cues of a threat.

View Article and Find Full Text PDF

A Hitchhiker's Ride: The Honey Bee Louse Braula Coeca (Diptera: Braulidae) Selects its Host by Eavesdropping.

J Chem Ecol

June 2024

Social Insects Research Group, Department of Zoology and Entomology, University of Pretoria, Private Bag X20, Hatfield, 0028, Republic of South Africa.

Article Synopsis
  • The bee louse Braula spp. attaches to honey bees to steal food, but not all bees carry these parasites, and their host selection process is unclear.
  • Researchers used bioassays and chemical analyses to study B. coeca's preferences, finding that these lice prefer the mandibular gland pheromones of bees that carry them.
  • The study identified key chemical differences between worker bees with and without B. coeca, suggesting that the lice use specific pheromones as cues to enhance their food acquisition from bees considered more dominant in food-sharing.
View Article and Find Full Text PDF

Species diversity and interspecific information flow.

Biol Rev Camb Philos Soc

June 2024

Division of Ecology and Evolution, Research School of Biology, Australian National University, Canberra, ACT, 2600, Australia.

Interspecific information flow is known to affect individual fitness, population dynamics and community assembly, but there has been less study of how species diversity affects information flow and thereby ecosystem functioning and services. We address this question by first examining differences among species in the sensitivity, accuracy, transmissibility, detectability and value of the cues and signals they produce, and in how they receive, store and use information derived from heterospecifics. We then review how interspecific information flow occurs in communities, involving a diversity of species and sensory modes, and how this flow can affect ecosystem-level functions, such as decomposition, seed dispersal or algae removal on coral reefs.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!