NTU Undergraduates' research April 2014 - Biosciences | Page 105

Abstract Alien invaders: Three of a kind? Samuel David James Cutler Invasion is as old as evolution of life, from the invasion of the seas, to that of land, to the air, and more recently as a result of human activity. Biological invasions are second only to loss of habitat and land fragmentation in terms of how damaging and threatening they are to global biodiversity. With the globalisation of trade, the risk of invasive species entering many ecosystems is rising. Therefore, the study of invasive species and their management and control is extremely critical. Himalayan balsam (Impatiens glandulifera) was introduced in 1839 as an ornamental plant. It is now found across the entirety of the UK, having spread along watercourses. This species can replace native flora on invaded sites and suppress woodland regeneration after disturbances. Management of I. glandulifera is of high cost and limited effectiveness. The signal crayfish (P. leniusculus) was introduced in 1976 and is now distributed over large parts of the UK. The greatest impact of this is on Britain’s native crayfish, A. pallipes, which has experienced massive declines. Like I. glandulifera, management is of limited effectiveness. Ash dieback (Hymenoscyphus pseudoalbidus) was found in the UK in late 2012, having been present in the EU since the early 1990’s. It spreads quickly, killing all ash trees that are infected. It has the potential to cause great environmental, economic and societal damage to the UK. A management plan is in place with clear objectives to control the very current issue. When invasive species are allowed to invade, their spread can often be overwhelming. Control of invasive species after extensive spread is difficult with most management techniques being inefficient and costly. In the case of ash dieback, everything possible must be done to control the threat while it is still affordable and potentially attainable. For future control, prevention may be superior to eradication and therefore, faster and more efficient frameworks should be established to react to other potential threats.