Skip to main content

Table 5 Data coding and extraction criteria

From: How effective are protected areas for reducing threats to biodiversity? A systematic review protocol

Section

Content

Metadata

Authors & Publication year, title, publication type, journal, DOI, scale (e.g., Local, regional, global), ecosystem type, threat assessment method, does the study include a control? What variables are considered? Taxonomic group(s) studied, methods, reported threats, data location within article, comments

Information relating to the inclusion criteria

(a) Population: Reported threats IUCN Threat Classification Scheme V3.3, proxies of threats

(b) Intervention: PA(s) characteristics: Name (if individual PA reported), number of PAs (When multiple PAs has been assessed, study area or country, year of establishment, management type, additional information

(c) Comparator: Assessment period, study type, study using control variables? Comparison type of the study (e.g. Time, control variable, management type?)

(d) Outcome: Threat level assessment after control and/or comparison (Value, effect, and in comparative analysis: Was the PA more effective than the control? effect of PA on overall threats (Positive, neutral, negative), identified factors leading the threat change, additional data (and additional comments

Additional calculations

To be defined according to the findings. Initially, results will be reported as the percentage of effectiveness of the PA/threat control strategies to change the threat state over time (Value and effect tabs) (Positive and negative values refer to positive and negative effects, respectively)