Skip to main content
Wiley Open Access Collection logoLink to Wiley Open Access Collection
. 2020 Mar 25;29(6):978–991. doi: 10.1111/geb.13082

A conceptual map of invasion biology: Integrating hypotheses into a consensus network

Martin Enders 1,2,3,, Frank Havemann 4, Florian Ruland 1,2,3, Maud Bernard‐Verdier 1,2,3, Jane A Catford 5,6,7, Lorena Gómez‐Aparicio 8, Sylvia Haider 9,10, Tina Heger 3,11,12, Christoph Kueffer 13,14, Ingolf Kühn 9,10,15, Laura A Meyerson 16, Camille Musseau 1,2,3, Ana Novoa 17, Anthony Ricciardi 14,18, Alban Sagouis 1,2,3, Conrad Schittko 3,11, David L Strayer 19,20, Montserrat Vilà 21,22, Franz Essl 14,23, Philip E Hulme 24, Mark van Kleunen 25,26, Sabrina Kumschick 14,27, Julie L Lockwood 28, Abigail L Mabey 7,29, Melodie A McGeoch 30, Estíbaliz Palma 6, Petr Pyšek 17,31, Wolf‐Christian Saul 14,32, Florencia A Yannelli 14, Jonathan M Jeschke 1,2,3
Editor: Jonathan Belmaker
PMCID: PMC8647925  PMID: 34938151

Abstract

Background and aims

Since its emergence in the mid‐20th century, invasion biology has matured into a productive research field addressing questions of fundamental and applied importance. Not only has the number of empirical studies increased through time, but also has the number of competing, overlapping and, in some cases, contradictory hypotheses about biological invasions. To make these contradictions and redundancies explicit, and to gain insight into the field’s current theoretical structure, we developed and applied a Delphi approach to create a consensus network of 39 existing invasion hypotheses.

Results

The resulting network was analysed with a link‐clustering algorithm that revealed five concept clusters (resource availability, biotic interaction, propagule, trait and Darwin’s clusters) representing complementary areas in the theory of invasion biology. The network also displays hypotheses that link two or more clusters, called connecting hypotheses, which are important in determining network structure. The network indicates hypotheses that are logically linked either positively (77 connections of support) or negatively (that is, they contradict each other; 6 connections).

Significance

The network visually synthesizes how invasion biology’s predominant hypotheses are conceptually related to each other, and thus, reveals an emergent structure – a conceptual map – that can serve as a navigation tool for scholars, practitioners and students, both inside and outside of the field of invasion biology, and guide the development of a more coherent foundation of theory. Additionally, the outlined approach can be more widely applied to create a conceptual map for the larger fields of ecology and biogeography.

Keywords: biological invasions, concepts, consensus map, Delphi method, invasion science, invasion theory, navigation tools, network analysis

1. INTRODUCTION

The first author’s grandfather was a master electrician working for the city of Munich, Germany, whose daily work consisted of repairing streetlights and other electrical devices for public use. One of his most impressive skills was his ability to intimately recall the details of every place in his district. By combining his knowledge with that of co‐workers familiar with other districts, one could have created a complete map of the city that would allow anyone to confidently navigate its streets. In many ways, a research field is quite similar to a city where its major questions and hypotheses represent subunits comparable to city districts. Such subunits can be represented on a map, whether of a city or a research field, the latter allowing scientists inside and outside of the field to better orientate themselves and navigate their own research interests. Such a map would also be useful for students, teachers, policymakers and managers, as it would allow them to efficiently identify the elements of science most pertinent to their interests and goals.

Some previous conceptual maps of science take the form of networks, and cover multiple disciplines; that is, they chart science as a whole and show how different disciplines relate to each other (Börner, 2010, 2015). These maps usually do not focus on the theory of any one discipline, and thus, do not represent the myriads of hypotheses and concepts of each research field. Given that concepts and hypotheses form the backbone of scientific inquiry, we posit that it is useful to simultaneously create conceptual maps within research disciplines to visualize the relationships among key hypotheses (Jeschke, 2014). Conceptual maps identify the degree to which hypotheses are similar, competing or contradictory, and use this information to aggregate them into broader clusters.

Conceptual maps in the form of networks can be particularly useful for disciplines with many hypotheses, where even researchers within the field tend to be restricted to specific research silos and are thereby increasingly unaware of similar hypotheses in the field. An example of such a discipline is invasion biology. Since the emergence of the field with the publication of Charles Elton’s book The ecology of invasions by animals and plants in 1958 and sustained research programmes developed in the 1990s (Richardson & Pyšek, 2008), it has accumulated an impressive number of hypotheses and concepts (see Table 1 for references and descriptions of the hypotheses). A recent online survey indicated that many invasion biologists appear to be knowledgeable about hypotheses and concepts they are directly working with, but do not demonstrate a consistent understanding of the relationship among these and other concepts in the field (Enders, Hütt, & Jeschke, 2018).

TABLE 1.

List of 39 common invasion hypotheses and how they were defined for this study [adapted from Catford et al. (2009) and Enders et al. (2018)]

Hypothesis Description Key reference(s)
ADP Adaptation The invasion success of non‐native species depends on the adaptation to the conditions in the exotic range before and/or after the introduction. Non‐native species that are related to native species are more successful in this adaptation Duncan and Williams (2002)
BA Biotic acceptance aka ‘the rich get richer’ Ecosystems tend to accommodate the establishment and coexistence of non‐native species despite the presence and abundance of native species Stohlgren, Jarnevitch, and Chong (2006)
BID Biotic indirect effects Non‐native species benefit from different indirect effects triggered by native species Callaway, Thelen, Rodriguez, and Holben (2004)
BR Biotic resistance aka diversity‐invasibility hypothesis An ecosystem with high biodiversity is more resistant against non‐native species than an ecosystem with lower biodiversity Elton (1958); Levine and D'Antonio (1999)
CP Colonization pressure Colonization pressure is defined as the number of species introduced to a given location. As colonization pressure increases, the number of established or invasive non‐native species in that location is predicted to increase Lockwood, Cassey, and Blackburn (2009)
DEM Dynamic equilibrium model The establishment of a non‐native species depends on natural fluctuations of the ecosystem, which influence the level of competition from local species Huston (1979)
DN Darwin’s naturalization The invasion success of non‐native species is higher in areas that are poor in closely related species than in areas that are rich in closely related species Daehler (2001); Darwin (1859)
DS Disturbance The invasion success of non‐native species is higher in highly disturbed than in relatively undisturbed ecosystems Elton (1958); Hobbs and Huenneke (1992)
EIM Ecological imbalance Invasion patterns are a function of the evolutionary characteristics of both the recipient region and potential donor regions. Species from regions with highly diverse evolutionary lineages are more likely to become successful invaders in less diverse regions Fridley and Sax (2014)
ENA Ecological naivety aka evolutionary naivety aka eco‐evolutionary naivety The impact of a non‐native species on biodiversity is influenced by the evolutionary experience of the invaded community. Thus, the largest impacts are caused by species (e.g., predators, herbivores, pathogens) invading systems where no phylogenetically or functionally similar species exist Diamond and Case (1986); Ricciardi and Atkinson (2004)
EE Enemy of my enemy aka accumulation‐of‐local‐pathogens hypothesis Introduced enemies of a non‐native species are less harmful to the non‐native than to the native species Eppinga et al. (2006)
EI Enemy inversion Introduced enemies of non‐native species are less harmful for them in the exotic than the native range, due to altered biotic and abiotic conditions Colautti, Ricciardi, Grigorovich, and MacIsaac (2004)
EICA Evolution of increased competitive ability After having been released from natural enemies, non‐native species will allocate more energy in growth and/or reproduction (this re‐allocation is due to genetic changes), which makes them more competitive Blossey and Nötzold (1995)
EN Empty niche The invasion success of non‐native species increases with the availability of empty niches in the exotic range MacArthur (1970)
ER Enemy release The absence of enemies in the exotic range is a cause of invasion success Keane and Crawley (2002)
ERD Enemy reduction The partial release of enemies in the exotic range is a cause of invasion success Colautti et al. (2004)
EVH Environmental heterogeneity The invasion success of non‐native species is high if the exotic range has a highly heterogeneous environment Melbourne et al. (2007)
GC Global competition A large number of different non‐native species is more successful than a small number Colautti, Grigorovich, and MacIsaac (2006)
HC Human commensalism Species that live in close proximity to humans are more successful in invading new areas than other species Jeschke and Strayer (2006)
HF Habitat filtering The invasion success of non‐native species in the new area is high if they are pre‐adapted to this area Weiher and Keddy (1995)
IM Invasional meltdown The presence of non‐native species in an ecosystem facilitates invasion by additional species, increasing their likelihood of survival or ecological impact Simberloff and Holle (1999)
IRA Increased resource availability The invasion success of non‐native species increases with the availability of resources Sher and Hyatt (1999)
IS Increased susceptibility If a non‐native species has a lower genetic diversity than the native species, there will be a low probability that the non‐native species establishes itself Colautti et al. (2004)
ISH Island susceptibility hypothesis Non‐native species are more likely to become established and have major ecological impacts on islands than on continents Jeschke (2008)
IW Ideal weed The invasion success of a non‐native species depends on its specific traits (e.g., life‐history traits) Baker (1965); Rejmánek and Richardson (1996)
LS Limiting similarity The invasion success of non‐native species is high if they strongly differ from native species, and low if they are similar to native species MacArthur and Levins (1967)
MM Missed mutualisms In their exotic range, non‐native species suffer from missing mutualists Mitchell et al. (2006)
NAS New associations New relationships between non‐native and native species can positively or negatively influence the establishment of the non‐native species Colautti et al. (2006)
NW Novel weapons In the exotic range, non‐native species can have a competitive advantage against native species because they possess a novel weapon, that is, a trait that is new to the resident community of native species and, therefore, affects them negatively Callaway and Ridenour (2004)
OW Opportunity windows The invasion success of non‐native species increases with the availability of empty niches in the exotic range, and the availability of these niches fluctuates spatio‐temporally Johnstone (1986)
PH Plasticity hypothesis Invasive species are more phenotypically plastic than non‐invasive or native ones Richards, Bossdorf, Muth, Gurevitch, and Pigliucci (2006)
PO Polyploidy hypothesis Polyploid organisms, particularly plants, are predicted to have an increased invasion success, since polyploidy can lead to higher fitness during the establishment phase and/or increased potential for subsequent adaptation te Beest et al. (2012)
PP Propagule pressure A high propagule pressure (a composite measure consisting of the number of individuals introduced per introduction event and the frequency of introduction events) is a cause of invasion success Lockwood, Cassey, and Blackburn (2005)
RER Resource‐enemy release The non‐native species is released from its natural enemies and can spend more energy in its reproduction, and invasion success increases with the availability of resources Blumenthal (2006)
RI Reckless invader aka ‘boom‐bust’ A population of a non‐native species that is highly successful shortly after its introduction can decline or disappear over time due to different reasons (such as competition with other introduced species or adaptation by native species) Simberloff and Gibbons (2004)
SDH Shifting defence hypothesis After having been released from natural specialist enemies, non‐native species will allocate more energy to cheap (energy‐inexpensive) defences against generalist enemies and less energy to expensive defences against specialist enemies (this re‐allocation is due to genetic changes); the energy gained in this way will be invested in growth and/or reproduction, which makes the non‐native species more competitive Doorduin and Vrieling (2011)
SG Specialist‐generalist Non‐native species are more successful in a new region if the local predators are specialists and local mutualists are generalists Callaway et al. (2004)
SP Sampling A large number of different non‐native species is more likely to become invasive than a small number due to interspecific competition. Also, the species identity of the locals is more important than the richness in terms of the invasion of an area Crawley, Brown, Heard, and Edwards (1999)
TEN Tens rule Approximately 10% of species successfully take consecutive steps of the invasion process Williamson and Brown (1986)

Some invasion hypotheses are more popular in particular taxa or subfields of invasion biology than in others. For example, analysing over 1,000 studies concerning 10 invasion hypotheses, Jeschke and Heger (2018: table 17.2) found that four of these hypotheses are predominantly addressed by studies on non‐native animals. Of the studies addressing the island susceptibility hypothesis, 65% focused on non‐native vertebrates (see also Jeschke et al., 2012); of the studies addressing the limiting similarity hypothesis, only 3% focused on vertebrates and 94% on plants. Cross‐taxonomic studies are rare for most hypotheses, with invasional meltdown being a notable exception (Jeschke et al., 2012). This hypothesis has also been addressed by a substantial number of studies in aquatic habitats (37%), whereas other hypotheses have been predominantly investigated in terrestrial habitats: of the nine other hypotheses analysed by Jeschke and Heger (2018: table 17.3), the average proportion of terrestrial studies was 84%. The overall clear pattern is that different invasion hypotheses are investigated within different taxonomic groups and different habitats. In addition, the hypotheses represent different perspectives on biological invasions: some focus on ecosystem properties (e.g., empty niche hypothesis), others on interactions with humans (e.g., propagule pressure hypothesis), biotic interactions (e.g., enemy release hypothesis) or species traits (e.g., ideal weed hypothesis).

Given that many researchers and conservationists working in the various subfields of invasion biology no longer appear to have a good overview of the general discipline’s major theoretical ideas (as indicated by Enders et al., 2018), a network of concepts, representing a conceptual map of invasion biology, would provide much‐needed orientation and navigation. Because maps can take the form of networks, we use both terms in a similar way: network is the more technical term and better describes how the map is methodologically constructed, whereas the term map focuses on the purpose as a navigation tool.

Several approaches have previously been used to visualize a network of invasion hypotheses, although they have some limitations. These attempts build on past work that highlighted commonalities among invasion hypotheses but did not visualize them (Catford, Jansson, & Nilsson, 2009). First, Enders et al. (2018) created a network by asking researchers which hypotheses they knew best. This approach assumes that if many researchers state that they know a given pair of hypotheses very well, these hypotheses probably have something in common, and can thus be connected in a network. This is a ‘black box’ approach, as it is unclear why researchers often know a certain pair of hypotheses well and thus what a connection between hypotheses really means.

Second, Enders and Jeschke (2018) assessed the conceptual similarity of hypotheses by classifying which factors are highlighted as most important for the invasion success of non‐native species. The resulting table characterizing the hypotheses (based on Catford et al., 2009) was then used to create a network showing conceptual overlaps. A weakness of this approach is that the classification was based on the assessments of very few experts, namely the authors of Catford et al. (2009; n = 3) and Enders and Jeschke (2018; n = 2).

Finally, Enders, Havemann, and Jeschke (2019) applied a bibliometric approach to create a network of invasion hypotheses. In their network, two hypotheses are connected if key publications featuring these hypotheses are frequently cited together. Co‐citation analysis was recently also applied by Trujillo and Long (2018) who created a sequence of nested co‐citation networks (although these are not hypothesis networks). The application of co‐citation analysis for creating hypothesis networks has three main limitations: (a) a publication may be cited for reasons other than the hypothesis that it refers to; (b) it is not possible to discriminate among hypotheses that support one another and those that contradict one another; and (c) especially in large, complex fields, research areas that are logically connected are not always bibliographically connected (Swanson, 1986).

To overcome the limitations of these approaches, we present a novel consensus approach based on the Delphi method to create a network of invasion hypotheses that capitalizes on the expertise of a group of invasion biologists who work on different topics and various taxonomic groups and habitats. The approach can be generally applied to any research field; thus, invasion biology is used as a case example here. In a Delphi method, the opinions of a group of experts converge towards a consensus in several steps during which the experts revise their opinion based on an anonymized summary of all experts’ opinions (Häder & Häder, 2000). In the resulting consensus network, we identified hypothesis clusters by applying a state‐of‐the‐art link‐clustering algorithm.

2. METHODS

2.1. Consensus approach

Our approach to creating a consensus network of invasion hypotheses consists of nine steps (Steps 4 to 8 represent the Delphi approach; Figure 1). In Step 1, a group of 29 experts in invasion biology were assembled to ensure a breadth of experience, wide taxonomic knowledge and geographic scope. Given the high level of expertise needed for the task, of the 29 experts, 15 were senior scientists (52%), 10 postdocs or on a similar level (34%) and 4 were PhD students (14%). Gender representation was roughly equal with 14 male (48%) and 15 female (52%) group members. Of the 29 experts, 19 were based in Europe (66%), 4 in North America (14%), 3 in Africa (10%) and 3 in Australasia (10%). Eighteen of these 29 invasion biologists plus Frank Havemann, an expert on network analysis, met in Berlin on 12–13 February 2018. The European location of the meeting (and associated logistical constraints) resulted in the over‐representation of European researchers. Follow‐up communication with all participants was through e‐mail.

FIGURE 1.

FIGURE 1

Description of the consecutive steps to create a consensus network of hypotheses and concepts. While we applied this approach for the field of invasion biology, it can be easily applied for other research fields as well [Colour figure can be viewed at wileyonlinelibrary.com]

In Step 2, the moderators (ME, FR and JMJ) compiled a list of 39 hypotheses and concepts related to the invasion stages of introduction, establishment and spread, with reference to the respective original publication author/s and year (Table 1). This list, which expanded the 33 hypotheses listed by Enders et al. (2018) by 6 additional hypotheses considered to be influential by the experts, is one of the most extensive lists of invasion hypotheses compiled to date (together with Chabrerie et al., 2019).

In Step 3, we asked the experts to build their own version of the network. Each of the 29 experts was given the option of following one of two approaches: (a) to draw a network of the 39 hypotheses, with similar hypotheses connected by a black line, contradictory hypotheses connected by a red line, and other hypotheses (which are not logically linked) unconnected; or (b) to assess the similarity of hypotheses in a matrix by giving a value of 1 for a pair of similar hypotheses, a value of −1 for contradictory hypotheses, and 0 for hypotheses that are not logically linked, not even in a contradictory way. Hypothesis pairs could be left aside and indicated with ‘NA’ if an expert felt uncomfortable making a decision about the similarity of these hypotheses. However, this option was rarely chosen by the participants (0.53%). Each expert then individually sent their network or matrix to the moderators.

A key aspect of Step 3 is that researchers may have a different interpretation of the terms ‘similar’ and ‘contradictory’. We collectively agreed that both terms mean two hypotheses are logically linked; we call them ‘similar’ if they are positively linked, and ‘contradictory’ if they are negatively linked. Beyond this definition, participants were free to decide what a ‘logical link’ means. This freedom allowed us to capture the diverse backgrounds and perspectives of individuals in the group. Most participants evaluated a logical link primarily based on the ecological mechanisms described in the hypotheses (e.g., hypotheses are logically linked if they both consider a certain type of biotic interaction), whereas some respondents included the level of organization (genotype, individual, population, community) or the indirect effects of an invasion in their link evaluation. Others considered which hypotheses gave rise to, or were cited by, another hypothesis; or to which degree the knowledge of one hypothesis substantially informs our understanding of another (e.g., understanding the enemy release hypothesis can be seen as fundamental for understanding the enemy reduction hypothesis), especially if the outcomes of both hypotheses go in the same direction (e.g., lack of enemies increases invasion success).

In Step 4, the moderators received the individual assessments and calculated the percentage of respondents who indicated hypotheses that are logically linked either positively (+1, i.e., similar hypotheses) or negatively (−1, i.e., contradictory hypotheses). For this calculation, NA scores were excluded. For example, given the entries for a hypothesis pair are: 0, 0, 1, −1, 1, −1, NA, 0, 1, 1, NA, 1, the percentage of +1 or −1 values compared to zeros for this response set would be 7/10 = .7 (2 × NA, 3 × 0, 5 × 1, 2 × −1). We then determined the sign of the connection (positive or negative) based on the majority of individual entries. In the example before, there are five entries with +1 and two entries with −1, thus the overall sign of the connection is positive. The overall score for this hypothesis pair would thus be +.7. We never found that the numbers of negative and positive signs were the same; in such a case, we would have asked the experts to re‐assess the connection. The final action in Step 4 was to discriminate (a) hypothesis pairs for which most participants agreed that the hypotheses are either similar (overall value > .65), contradictory (< −.65) or not logically linked (value between −.35 and .35) from (b) hypothesis pairs for which the entries were inconclusive (value close to ±.5: between −.65 and −.35, or between .35 and .65). The value of ±.65 as a decision rule was set by the group.

In Step 5, all participants were asked to re‐inspect hypothesis pairs with inconclusive entries (that was the case for 52 hypothesis pairs) and to individually send their revised network or matrix to the moderators.

In Step 6, the moderators calculated an overall hypothesis network based on the links among hypotheses, using the R statistical environment version 3.1.0 (R Development Core Team, 2018) and packages ‘sna’ (Handcock, Hunter, Butts, Goodreau, & Morris, 2003), ‘reshape2’ (Wickham, 2007) and ‘igraph’ (Csardi & Nepusz, 2006) (see below for details) and shared it with all participants.

In Step 7, the participants inspected the overall network, and those who disagreed with any element explained their reason for this disagreement by sending an individual e‐mail to the moderators who then shared the collected and anonymized feedback with the group.

In Step 8, participants inspected their assessments again based on this feedback and sent their final network or matrix to the moderators if any changes were made. All individual networks are provided in Supporting Information Table S1.

In Step 9, the moderators calculated final values for the link between each pair of hypotheses (Supporting Information Table S1) and constructed the final hypothesis network.

2.2. Clustering approach

To reveal the inner structure of a network, it is helpful to group the nodes (in our case: the hypotheses) of the network into clusters. A common way of doing so is node clustering, for which various algorithms exist (Fortunato, 2010). We applied four established node‐clustering algorithms which, however, led to different network clusters (see Supporting Information Appendix S1). These inconsistencies were largely due to the fact that some hypotheses did not seem to be part of any single cluster, but were instead bridging clusters. We therefore decided to apply a link‐clustering method instead (Ahn, Bagrow, & Lehmann, 2010; Evans & Lambiotte, 2009), an approach that allows for nodes to be members of multiple clusters. Link clustering is thus more flexible than node clustering where each node can only be in one cluster (see Supporting Information Appendix S1 for details).

Clusters of links induce node communities whereby the membership grade of each node to the community induced by link cluster L is given by the proportion of its internal links kiinLki (see below for details). Because we assumed that pairs of similar hypotheses identified in one region of the network are independent of hypothesis pairs in other regions, we chose a local approach to link clustering, where each link set L is evaluated independently from the rest of the network (Havemann, Gläser, & Heinz, 2017). Local link clustering allows for communities not only to overlap in boundary nodes, but also in inner nodes. One measure for evaluating link clusters is the escape probability of the link–node–link random walker. This random walker – introduced by Evans and Lambiotte (2009) – is the translation of the ordinary random walker into the world of link clustering. The walker starts from a link, goes randomly to one of its nodes, and then to one of the links of this node. If the escape probability is low, then L is a link set that is well separated from the rest of the network. The escape probability of a link–node–link random walker is given by the following equations (Havemann, Gläser, & Heinz, 2019):

PescL=σLkinL (1)

with

σL=i=1nkiinLkioutLki (2)

and

kinL=i=1nkiinL (3)

kiinL and kioutL are the internal and external degrees of node i with respect to link set L. Their sum is the node’s total degree.

ki=kiinL+kioutL. (4)

Since our hypothesis network is small, and the disjoint clusters are already very suggestive, we were able to avoid the random components in the evolutionary approach of Havemann et al. (2017) and only made local searches in the cost landscape of Pesc starting from the five disjoint clusters as seed link sets. Local searches go on the steepest path to the next local minimum in the cost landscape. In each step of a local search, we added this link to the set that resulted in the minimum cost. After reaching a local minimum, we continued the search, because cost landscapes are rough, and we did not want to get trapped in a local minimum that is only a few steps away from a deeper one. After expanding link sets, we excluded links until we found the final hypothesis clusters with the lowest escape probability. Further information on this approach is provided in Havemann et al. (2017).

3. RESULTS

The resulting consensus network included (a) five clusters covering 32 of the 39 hypotheses; (b) six connecting hypotheses acting as bridges between clusters (human commensalism, HC, connecting three clusters; and resource‐enemy release, RER, increased resource availability, IRA, reckless invader, RI, biotic indirect effects, BID, and empty niche, EN, each connecting two clusters); and (c) one hypothesis not connected with any other hypothesis in the network (increased susceptibility, IS, with the closest connection with the polyploidy hypothesis, PO; link = .48; Supporting Information Table S1) (Figure 2).

FIGURE 2.

FIGURE 2

Network of 39 common hypotheses in invasion biology, clusters calculated with the local link‐clustering algorithm (hypothesis names are abbreviated as in Table 1 where details on each hypothesis are provided). Colours indicate membership of hypotheses to concept clusters. The representation is simplified in that, for example, the node empty niche (EN) appears to be split into two equal parts, while it actually belongs slightly more in Darwin’s cluster (6/11 = 55%) than in the resource availability cluster (5/11 = 45%); see Supporting Information Figure S2 for details. Similar hypotheses are connected with black lines, whereas contradictory hypotheses are connected with red lines [Colour figure can be viewed at wileyonlinelibrary.com]

We named the five clusters the (a) ‘biotic interaction cluster’ accounting for nine full‐member hypotheses (i.e., without connecting hypotheses), (b) ‘Darwin’s cluster’ (seven full‐member hypotheses), (c) ‘trait cluster’ (six full‐member hypotheses), (d) ‘propagule cluster’ (six full‐member hypotheses) and (e) ‘resource availability cluster’ (four full‐member hypotheses) (Figure 2). The trait cluster is actually nested in Darwin’s cluster (cf. Supporting Information Appendix S1), hence one could also consider Darwin’s cluster to include 13 full‐member hypotheses that are further separated into two sub‐clusters. For simplicity, though, and because none of the other clusters includes sub‐clusters, we do not usually discriminate between first‐ and second‐level clusters here.

4. DISCUSSION

4.1. Hypothesis clusters

Each of the five clusters we identified encapsulates a main explanation why a non‐native species may become invasive (sensu Blackburn et al., 2011). The commonality among the hypotheses in the biotic interaction cluster is the role of interspecific (mostly negative) interactions in species invasion success. Most hypotheses in this cluster assume that natural enemies (i.e., predators, herbivores, parasites and pathogens) control species populations, so when a species is introduced to a new area, populations thrive because enemies are left behind. Similarly, Schulz, Lucardi, and Marsico (2019) recently offered a framework of hypotheses focusing on how enemies/antagonists affect invasion success. The lack of specific enemies in the recipient location gives an advantage to non‐native over native species (enemy release, ER) despite generalist enemies also reducing their performance. Some hypotheses in this cluster posit that enemy release allows non‐native individuals to reallocate resources from defences against natural enemies towards growth, fitness and competitive ability (evolution of increased competitive ability, EICA; shifting defence hypothesis, SDH). Mutualistic interactions with native species (e.g., pollinators, seed dispersers, mycorrhiza) also increase invasion success (Richardson, Allsopp, D'Antonio, Milton, & Rejmanek, 2000), whereas interspecific competition with the native species (reckless invader, RI) or a lack of mutualists (i.e., those missing compared to the invader’s home range) impede it (missed mutualism, MM).

The hypotheses in the resource availability cluster associate invasion success with invader access to resources, which is affected by abiotic and biotic conditions and their interaction (Catford et al., 2009 and references therein). The first three hypotheses (increased resource availability, IRA; disturbance, DS; opportunity windows, OW) centre on temporary increases in resource availability, which can result from a decline in resource uptake in the community and/or an increase in supply. Increased resource availability (IRA) and disturbance (DS) focus on fluctuations through time, whereas opportunity windows (OW) considers fluctuations in both space and time (see also Davis, Grime, & Thompson, 2000). High resource availability, even if only temporary, enables invader populations to become established, from which point they can continue to grow and spread. The dynamic equilibrium model (DEM) centres on interactions between disturbance and productivity, which collectively affect resource availability and strength of resource competition, and thus opportunities for invasion. While the underlying mechanism is arguably the same (sufficient resource availability), environmental heterogeneity (EVH) is phenomenological and pattern‐based, unlike the first four process‐based hypotheses. EVH essentially attributes invasion success to incomplete resource uptake by the resident community. This is because communities in ecosystems with high environmental heterogeneity are less likely to be saturated, such that associated resources remain unused (or under‐used). These available resources provide ripe opportunities for (effectively competition‐free) invasion by species having the appropriate niche. EVH is strongly linked with the empty niche hypothesis (EN; which follows Elton’s rather than Hutchinson’s niche concept, cf. Pulliam, 2000), a connecting concept between the resource availability cluster and Darwin’s cluster (Figure 2).

Many of the hypotheses in Darwin’s cluster have an eco‐evolutionary perspective on biological invasions, which highlights the importance of species’ evolutionary legacies in shaping the outcome of biotic interactions that result from species introductions. This is true for the ecological imbalance (EIM) hypothesis, which focuses on the evolutionary characteristics of both the region that receives the non‐native species and regions where that species is native. Another example is ecological naivety (ENA), which is also known as evolutionary naivety. Ecological niches are shaped evolutionarily, and many hypotheses in this cluster are related to species’ niches, either that of the non‐native species arriving in an ecosystem or that of the species assemblage composing the native community. Indeed, several of these hypotheses propose that non‐native species could only establish and potentially become invasive if they can occupy niches different from those of the native species, a theoretical concept developed by Shea and Chesson (2002). In practice, niche similarity or divergence has been characterized by species’ functional traits, given their link to resource acquisition, evolutionary fitness and ecosystem processes (Divíšek et al., 2018; Vidal‐Garcia & Keogh, 2017; Wang, Hu, Wang, Liu, & Yu, 2018), or by species relatedness, assuming that species niches are conserved in phylogenies (Prinzing, Durka, Klotz, & Brandl, 2001; Thuiller et al., 2010). In other words, the likelihood of a non‐native species becoming invasive is, according to these hypotheses, related to dissimilarities in the non‐native species’ characteristics with respect to the recipient community, and thus, associated with their resource use in the new environment. Furthermore, the relationship between species evolution, niche space and species traits explains why we found the trait cluster to be nested in Darwin’s cluster.

The trait cluster includes six hypotheses that focus on traits to explain why a non‐native species may become invasive. This is a topic of long‐standing interest within invasion biology, from its very onset, as it is thought that certain species traits are associated with invasiveness (Baker, 1974; Capellini, Baker, Allen, Street, & Venditti, 2015; Mahoney et al., 2015; Pyšek & Richardson, 2007; van Kleunen, Weber, & Fischer, 2010). The hypotheses included within this cluster consider traits that can help non‐native species to generally become invasive (ideal weed, IW), to compete with native species (novel weapons, NW), or to adapt to the novel conditions found in their introduced ranges (adaptation, ADP; polyploidy hypothesis, PO; plasticity hypothesis, PH; habitat filtering, HF).

Finally, the hypotheses in the propagule cluster relate the numbers of introduced non‐native species or individuals to the probability that they will become invasive. The propagule pressure hypothesis (PP) operates at the population level and suggests that the likelihood of a non‐native population being able to establish increases with the number of individuals of that species being introduced. Several potential mechanisms underpin the propagule pressure hypothesis, all of which invoke the ability of larger numbers of individuals to overcome random, stochastic forces to ensure population persistence. The other five hypotheses operate at the community level and suggest that greater numbers of species become invasive if greater numbers of species are introduced (colonization pressure, CP; global competition, GC; invasional meltdown, IM; sampling, SP; tens rule, TEN). Similar to the propagule pressure hypothesis, these hypotheses assume that the chance of some species experiencing favourable ecological conditions increases with greater numbers of species introductions.

In a nutshell, each hypothesis cluster focuses on a particular perspective on biological invasions. A related question is if research done within each cluster focused on particular taxonomic groups or habitats. Four of the 10 hypotheses for which Jeschke and Heger (2018: tables 17.2, 17.3; underlying data available at http://www.hi‐knowledge.org) gathered data are in Darwin’s cluster (Darwin’s naturalization, DN; limiting similarity, LS; biotic resistance, BR; island susceptibility hypothesis, ISH; the remaining three are in each of the other clusters) and three are in the propagule cluster (propagule pressure, PP; tens rule, TEN; invasional meltdown, IM), which allows us to make a first assessment of potential research biases for these two clusters. Indeed, relatively more studies in Darwin’s cluster focused on plants (67.3%, based on percentage values for each hypothesis) than in the propagule cluster (37.7%). Similarly, while only an average of 2.6 and 8.4% of studies addressing hypotheses in Darwin’s cluster focused on marine and freshwater habitats, respectively, studies in the propagule cluster are less biased; here, an average of 10.2 and 18.1% of the studies focused on marine and freshwater habitats, respectively. Thus, even these limited data show strong differences in research focus between hypothesis clusters. These differences indicate biases and different types of knowledge gaps in each particular cluster. More detailed explorations of these biases and gaps are certainly warranted.

4.2. Connecting hypotheses

While clusters of hypotheses can reflect fertile areas of similar research questions, connecting hypotheses are nodes that apparently overlap with, or logically connect, two or more clusters. Thus, these nodes offer logical links between major areas of research within the field. For example, the increased resource availability (IRA) hypothesis connects the resource availability and biotic interaction clusters. The former cluster is concerned with changing conditions and opportunities, such as shifts in resource uptake and supply, whereas the latter cluster emphasizes the importance of a favourable biotic context in which enemies no longer constrain the population growth of the invader. In particular, non‐native species must often co‐opt limiting resources from native competitors in order to maintain population persistence; thus, the IRA hypothesis is linked to the biotic interaction cluster. Similarly, the human commensalism hypothesis (HC) logically connects to the trait cluster by recognizing the importance of trait plasticity and pre‐adaptation for surviving human‐mediated disturbances and land use (e.g., agriculture), and for exploiting human transportation systems. Human commensalism also implies greater opportunities for propagule dispersal, hence the link to the propagule cluster. Finally, human commensalism reflects the ability of successful invaders to opportunistically exploit human‐mediated disturbance events – which promote enemy release and resource release via the loss of resident predators and competitors.

To our knowledge, such connecting hypotheses have not been identified before. Thus, in addition to the largest hypothesis network created to date using a state‐of‐the‐art method, another novel result of this study is the identification of hypotheses that connect hypothesis clusters, and thus, serve as conceptual bridges in invasion biology. Such conceptual bridges play a key role in advancing scientific goals, and an important extension of the work presented here will be to identify them also at the level of disciplines (in addition to the level of hypotheses shown here). For example, Jeschke (2014) outlined that the ‘diversity‐stability hypothesis which states that ecosystems with high biodiversity are more stable than ecosystems with low biodiversity’ (p. 1,230) is a more general formulation of the biotic resistance hypothesis (BR) in invasion biology where ‘stability’ is resistance against non‐native species. The same idea can be found in disease ecology in which ‘stability’ is resistance against pathogens (Lively, 2010; Sommer, 2005). Identifying more such connecting hypotheses will help us to better bridge research within and between research fields.

4.3. Comparison with previous hypothesis networks in invasion biology

Some papers previously categorized hypotheses and concepts in invasion biology (e.g., Catford et al., 2009; Chabrerie et al., 2019; Gurevitch, Fox, Wardle, Inderjit, & Taub, 2011; Schulz et al., 2019) or visualized them in the form of networks (Enders et al., 2018, 2019; Enders & Jeschke, 2018). Although useful for providing a first overview, these previous approaches to creating hypothesis networks in invasion biology had several limitations that were overcome by our consensus approach. In particular, here we assembled a fairly large and diverse group of experts constructing the consensus network who were offered the opportunity to discuss why they consider hypotheses to be logically linked, and they could differentiate between positive linkages, negative linkages or unlinked hypotheses. Another advantage to our approach here is that, unlike quantitative bibliometric approaches, it does not depend on a large literature database. Finally, our consensus approach reflects how the concepts are being currently used in practice, and presently perceived and interpreted by experts working in the field. This is in contrast to the bibliometric approach, which is based on historic citation patterns.

The networks resulting from the consensus approach used in this paper and those from previous bibliometric approaches (see Enders et al., 2019) are quite similar; however, due to the outlined benefits of the consensus approach, we recommend this approach to create networks of hypotheses and concepts in a research field.

5. CONCLUSIONS AND OUTLOOK

Our hypothesis network visualizes the conceptual structure of invasion biology. It displays relationships among invasion hypotheses that can in turn be tested with empirical studies. A next step should be to offer both the network and empirical studies as interactive tools online. This output provides the opportunity to (a) bridge the gap between theoretical‐conceptual and empirical work, and (b) offer a visual and user‐friendly interface to explore the knowledge depth, gaps and redundancies of the field. In this way, it would be immediately visible which hypotheses are empirically supported under which circumstances, particularly when dividing the 39 hypotheses into more specific sub‐hypotheses following the hierarchy‐of‐hypotheses approach (Jeschke & Heger, 2018). A first step in this direction is available at the website http:// www.hi‐knowledge.org. Another helpful extension of the network will be to visualize taxonomic and habitat biases among the clusters and hypotheses.

The clusters in our network provide a clear, simplified summary of the main mechanisms that, according to current theory, govern the introduction, establishment and spread of invasive species. The clustering highlights that the field is currently dominated by attention to antagonistic interactions between non‐native and native species; it recognizes the stochastic nature of invasions through spatio‐temporal variation in biotic and abiotic conditions (resource availability cluster), as well as in propagule supply and filtering (propagule cluster); and part of the foundation of the field is built upon venerable hypotheses arising from Darwin and Elton (cf. Table 1). This method could also be used to identify temporal trends in the concepts, that is, when hypotheses were proposed and coined, and when they experienced most empirical examination. One might see moving waves of research effort through the network as research fashions and techniques change.

Further, a hypothesis network such as the one constructed here can guide a researcher working on one hypothesis to explore potentially relevant ideas and literature concerning hypotheses that are nearby in the cluster, and to highlight important covariables that should be used in analyses that might otherwise be overlooked. The researcher will also be pointed towards critical research and knowledge gaps. Similarly, a hypothesis network avoids the formulation of additional repetitive hypotheses. Anyone who wants to propose a new hypothesis or mechanism to the field can consult the network to see where the new contribution would be located and if it overlaps with existing ones.

Our hypothesis network is not definitive. It does not include all existing invasion hypotheses (cf. Chabrerie et al., 2019) and obviously cannot include hypotheses that do not yet exist. Invasion biology will further develop, and so will its conceptual structure. For example, the importance of humans as drivers of invasions does not play a dominant role in the current network. Humans clearly play a key role in the propagule cluster, as it highlights the importance of non‐native species’ introductions which are mediated by humans. We expect that in the future and with increasing research efforts focusing on the Anthropocene, the field will focus more on the role of humans (Kueffer, 2017) and how we can better integrate related, but still largely isolated research fields (Heger et al., 2019; Vaz et al., 2017). For the latter, the connecting hypotheses highlighted in this study will play an important role. Since the conceptual map presented here is a stepping stone towards the future of the field, it should be regularly revised and extended.

Finally, the consensus approach outlined here can be applied to any research field. We strongly encourage its application particularly in disciplines where, as in invasion biology, there are so many hypotheses and concepts that it is hard to gain an overview without a navigation tool like a hypothesis network. Connecting an increasing number of hypothesis networks could facilitate cross‐disciplinary research by revealing overlaps and joint ideas, enhancing the understanding of basic ideas and transfer of knowledge. A resulting growing atlas of knowledge could thus help address complex problems like multi‐causality in biodiversity change (Sala et al., 2000; Settele et al., 2005), and to build a solid basis for tackling the current environmental crisis. Such an atlas would also reveal hypotheses and concepts that connect disciplines, helping researchers to find out if colleagues from another discipline have already come up with concepts and ideas to potentially solve challenges in their own field. Therefore, we call on researchers across scientific disciplines to create conceptual maps for their fields. Let’s then connect these maps to jointly build an atlas of knowledge.

BIOSKETCH

Martin Enders is a young biologist and philosopher who focuses on invasion biology. He is especially interested in the synthesis and visualization of different hypotheses and concepts to construct ‘maps’ of research fields. His broad research interests include theoretical ecology, biological invasions and philosophical biology.

Supporting information

TABLE S1

Appendix S1

ACKNOWLEDGMENTS

Financial support was provided by the Foundation of German Business (sdw) to ME; by the German Federal Ministry of Education and Research (BMBF) within the collaborative project ‘Bridging in Biodiversity Science—BIBS’ (funding number 01LC1501A‐H) to ME, AS, CM, CS, MB‐V and TH; and by the Deutsche Forschungsgemeinschaft (DFG, JE 288/9‐2) to JMJ. SK, FAY and W‐CS acknowledge support from Stellenbosch University's DST‐NRF Centre of Excellence for Invasion Biology (C•I•B), MV from Belmont Forum‐BiodivERsA project InvasiBES (PCI2018‐092939) funded by the Spanish Ministerio de Ciencia, Innovación y Universidades. SK acknowledges financial support from the South African National Department of Environment Affairs through its funding to the Invasive Species Programme of the South African National Biodiversity Institute. AN and PP were supported by EXPRO grant no. 19‐28807X (Czech Science Foundation) and the long‐term research development project RVO 67985939 (The Czech Academy of Sciences). LG‐A acknowledges support from the MICINN project INTERCAPA (CGL‐2014‐ 56739‐R), FE and JMJ from the BiodivERsA‐Belmont Forum Project ‘Alien Scenarios’ (FWF project no I 4011‐B32, BMBF project 01LC1807B), AM from the Natural Environmental Research Council (grant number NE/L002531/1) and AR from the Natural Sciences and Engineering Research Council of Canada.

Enders M, Havemann F, Ruland F, et al. A conceptual map of invasion biology: Integrating hypotheses into a consensus network. Global Ecol Biogeogr. 2020;29:978–991. 10.1111/geb.13082

DATA ACCESSIBILITY

The data created in this study and underlying the presented analyses are freely available online in the Supporting Information accompanying this publication.

REFERENCES

  1. Ahn, Y. Y. , Bagrow, J. P. , & Lehmann, S. (2010). Link communities reveal multiscale complexity in networks. Nature, 466, 761–764. 10.1038/nature09182 [DOI] [PubMed] [Google Scholar]
  2. Baker, H. G. (1965). Characteristics and modes of origin of weeds. In Baker H. G., & Stebbins G. L. (Eds.), The genetics of colonizing species; proceedings (pp. 147–168). New York, NY: Academic Press. [Google Scholar]
  3. Baker, H. G. (1974). The evolution of weeds. Annual Review of Ecology and Systematics, 5, 1–24. 10.1146/annurev.es.05.110174.000245 [DOI] [Google Scholar]
  4. Blackburn, T. M. , Pyšek, P. , Bacher, S. , Carlton, J. T. , Duncan, R. P. , Jarošík, V. , … Richardson, D. M. (2011). A proposed unified framework for biological invasions. Trends in Ecology and Evolution, 26, 333–339. 10.1016/j.tree.2011.03.023 [DOI] [PubMed] [Google Scholar]
  5. Blossey, B. , & Nötzold, R. (1995). Evolution of increased competitive ability in invasive nonindigenous plants—A hypothesis. Journal of Ecology, 83, 887–889. 10.2307/2261425 [DOI] [Google Scholar]
  6. Blumenthal, D. M. (2006). Interactions between resource availability and enemy release in plant invasion. Ecology Letters, 9, 887–895. 10.1111/j.1461-0248.2006.00934.x [DOI] [PubMed] [Google Scholar]
  7. Börner, K. (2010). Atlas of science: Visualizing what we know. Cambridge, MA: MIT Press. [DOI] [PMC free article] [PubMed] [Google Scholar]
  8. Börner, K. (2015). Atlas of knowledge: Anyone can map. Cambridge, MA: MIT Press. [Google Scholar]
  9. Callaway, R. M. , & Ridenour, W. M. (2004). Novel weapons: Invasive success and the evolution of increased competitive ability. Frontiers in Ecology and the Environment, 2, 436–443. 10.2307/3868432 [DOI] [Google Scholar]
  10. Callaway, R. M. , Thelen, G. C. , Rodriguez, A. , & Holben, W. E. (2004). Soil biota and exotic plant invasion. Nature, 427, 731–733. 10.1038/nature02322 [DOI] [PubMed] [Google Scholar]
  11. Capellini, I. , Baker, J. , Allen, W. L. , Street, S. E. , & Venditti, C. (2015). The role of life history traits in mammalian invasion success. Ecology Letters, 18, 1099–1107. 10.1111/ele.12493 [DOI] [PMC free article] [PubMed] [Google Scholar]
  12. Catford, J. A. , Jansson, R. , & Nilsson, C. (2009). Reducing redundancy in invasion ecology by integrating hypotheses into a single theoretical framework. Diversity and Distributions, 15, 22–40. 10.1111/j.1472-4642.2008.00521.x [DOI] [Google Scholar]
  13. Chabrerie, O. , Massol, F. , Facon, B. , Thevenoux, R. , Hess, M. , Ulmer, R. , … Renault, D. (2019). Biological invasion theories: Merging perspectives from population, community and ecosystem scales. Preprints. 2019100327 [Google Scholar]
  14. Colautti, R. I. , Grigorovich, I. A. , & MacIsaac, H. J. (2006). Propagule pressure: A null model for biological invasions. Biological Invasions, 8, 1023–1037. 10.1007/s10530-005-3735-y [DOI] [Google Scholar]
  15. Colautti, R. I. , Ricciardi, A. , Grigorovich, I. A. , & MacIsaac, H. J. (2004). Is invasion success explained by the enemy release hypothesis? Ecology Letters, 7, 721–733. 10.1111/j.1461-0248.2004.00616.x [DOI] [Google Scholar]
  16. Crawley, M. J. , Brown, S. L. , Heard, M. S. , & Edwards, G. R. (1999). Invasion‐resistance in experimental grassland communities: Species richness or species identity? Ecology Letters, 2, 140–148. 10.1046/j.1461-0248.1999.00056.x [DOI] [Google Scholar]
  17. Csardi, G. , & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695. http://igraph.org [Google Scholar]
  18. Daehler, C. C. (2001). Darwin's naturalization hypothesis revisited. The American Naturalist, 158, 324–330. 10.1086/321316 [DOI] [PubMed] [Google Scholar]
  19. Darwin, C. (1859). On the origin of species by means of natural selection, or, The preservation of favoured races in the struggle for life. London, UK: J. Murray. [PMC free article] [PubMed] [Google Scholar]
  20. Davis, M. A. , Grime, J. P. , & Thompson, K. (2000). Fluctuating resources in plant communities: A general theory of invasibility. Journal of Ecology, 88, 528–534. 10.1046/j.1365-2745.2000.00473.x [DOI] [Google Scholar]
  21. Diamond, J. , & Case, T. J. (1986). Overview: Introductions, extinctions, exterminations, and invasions. In Diamond J. & Case T. J. (Eds.), Community ecology (pp. 65–79). New York, NY: Harper and Row. [Google Scholar]
  22. Divíšek, J. , Chytry, M. , Beckage, B. , Gotelli, N. J. , Lososova, Z. , Pysek, P. , … Molofsky, J. (2018). Similarity of introduced plant species to native ones facilitates naturalization, but differences enhance invasion success. Nature Communications, 9, 4631. 10.1038/s41467-018-06995-4 [DOI] [PMC free article] [PubMed] [Google Scholar]
  23. Doorduin, L. J. , & Vrieling, K. (2011). A review of the phytochemical support for the shifting defence hypothesis. Phytochemistry Reviews, 10, 99–106. 10.1007/s11101-010-9195-8 [DOI] [PMC free article] [PubMed] [Google Scholar]
  24. Duncan, R. P. , & Williams, P. A. (2002). Ecology—Darwin's naturalization hypothesis challenged. Nature, 417, 608–609. 10.1038/417608a [DOI] [PubMed] [Google Scholar]
  25. Elton, C. S. (1958). The ecology of invasions by animals and plants. London, UK: Methuen. [Google Scholar]
  26. Enders, M. , Havemann, F. , & Jeschke, J. M. (2019). A citation‐based map of concepts in invasion biology. NeoBiota, 47, 23–42. 10.3897/neobiota.47.32608 [DOI] [Google Scholar]
  27. Enders, M. , Hütt, M.‐T. , & Jeschke, J. M. (2018). Drawing a map of invasion biology based on a network of hypotheses. Ecosphere, 9, e02146. 10.1002/ecs2.2146 [DOI] [Google Scholar]
  28. Enders, M. , & Jeschke, J. M. (2018). A network of invasion hypotheses. In Jeschke J. M. & Heger T. (Eds.), Invasion biology: Hypotheses and evidence (pp. 49–59). Wallingford, UK: CABI. [Google Scholar]
  29. Eppinga, M. B. , Rietkerk, M. , Dekker, S. C. , De Ruiter, P. C. , Van der Putten, W. H. , & Van der Putten, W. H. (2006). Accumulation of local pathogens: A new hypothesis to explain exotic plant invasions. Oikos, 114, 168–176. 10.1111/j.2006.0030-1299.14625.x [DOI] [Google Scholar]
  30. Evans, T. S. , & Lambiotte, R. (2009). Line graphs, link partitions, and overlapping communities. Physical Review E, 80, 016105. 10.1103/PhysRevE.80.016105 [DOI] [PubMed] [Google Scholar]
  31. Fortunato, S. (2010). Community detection in graphs. Physics Reports, 486, 75–174. 10.1016/j.physrep.2009.11.002 [DOI] [Google Scholar]
  32. Fridley, J. D. , & Sax, D. F. (2014). The imbalance of nature: Revisiting a Darwinian framework for invasion biology. Global Ecology and Biogeography, 23, 1157–1166. 10.1111/geb.12221 [DOI] [Google Scholar]
  33. Gurevitch, J. , Fox, G. A. , Wardle, G. M. , Inderjit, & Taub, D. (2011). Emergent insights from the synthesis of conceptual frameworks for biological invasions. Ecology Letters, 14, 407–418. 10.1111/j.1461-0248.2011.01594.x [DOI] [PubMed] [Google Scholar]
  34. Häder, M. , & Häder, S. (Eds.) (2000). Die Delphi‐Technik in den Sozialwissenschaften: Methodische Forschungen und innovative Anwendungen. Wiesbaden, Germany: VS Verlag für Sozialwissenschaften. [Google Scholar]
  35. Handcock, M. S. , Hunter, D. R. , Butts, C. T. , Goodreau, S. M. , & Morris, M. (2003). statnet: Software tools for the statistical modeling of network data. http://statnetproject.org [DOI] [PMC free article] [PubMed]
  36. Havemann, F. , Gläser, J. , & Heinz, M. (2017). Memetic search for overlapping topics based on a local evaluation of link communities. Scientometrics, 111, 1089–1118. 10.1007/s11192-017-2302-5 [DOI] [Google Scholar]
  37. Havemann, F. , Gläser, J. , & Heinz, M. (2019). Communities as well separated subgraphs with cohesive cores: Identification of core‐periphery structures in link communities. In Aiello L. M., Cherifi C., Cherifi H., Lambiotte R., Lio P., & Rocha L. M. (Eds.), Complex networks and their applications VII, Studies in computational intelligence (pp. 219–230). Basel, Switzerland: Springer Nature Switzerland. 10.1007/978-3-030-05411-3_18 [DOI] [Google Scholar]
  38. Heger, T. , Bernard‐Verdier, M. , Gessler, A. , Greenwood, A. D. , Grossart, H.‐P. , Hilker, M. , … Jeschke, J. M. (2019). Towards an integrative, eco‐evolutionary understanding of ecological novelty: Studying and communicating interlinked effects of global change. BioScience, 69, 888–899. 10.1093/biosci/biz095 [DOI] [PMC free article] [PubMed] [Google Scholar]
  39. Hobbs, R. J. , & Huenneke, L. F. (1992). Disturbance, diversity, and invasion—Implications for conservations. Conservation Biology, 6, 324–337. 10.1046/j.1523-1739.1992.06030324.x [DOI] [Google Scholar]
  40. Huston, M. (1979). A general hypothesis of species diversity. The American Naturalist, 113, 81–101. 10.1086/283366 [DOI] [Google Scholar]
  41. Jeschke, J. M. (2008). Across islands and continents, mammals are more successful invaders than birds. Diversity and Distributions, 14, 913–916. 10.1111/j.1472-4642.2008.00488.x [DOI] [Google Scholar]
  42. Jeschke, J. M. (2014). General hypotheses in invasion ecology. Diversity and Distributions, 20, 1229–1234. 10.1111/ddi.12258 [DOI] [Google Scholar]
  43. Jeschke, J. M. , Gómez Aparicio, L. , Haider, S. , Heger, T. , Lortie, C. J. , Pyšek, P. , & Strayer, D. L. (2012). Taxonomic bias and lack of cross‐taxonomic studies in invasion biology. Frontiers in Ecology and the Environment, 10, 349–350. 10.1890/12.WB.016 [DOI] [Google Scholar]
  44. Jeschke, J. M. , & Heger, T. (2018). Invasion biology: Hypotheses and evidence. Wallingford, UK: CABI. [Google Scholar]
  45. Jeschke, J. M. , & Strayer, D. L. (2006). Determinants of vertebrate invasion success in Europe and North America. Global Change Biology, 12, 1608–1619. 10.1111/j.1365-2486.2006.01213.x [DOI] [Google Scholar]
  46. Johnstone, I. M. (1986). Plant invasion windows—A time‐based classification of invasion potential. Biological Reviews of the Cambridge Philosophical Society, 61, 369–394. 10.1111/j.1469-185X.1986.tb00659.x [DOI] [Google Scholar]
  47. Keane, R. M. , & Crawley, M. J. (2002). Exotic plant invasions and the enemy release hypothesis. Trends in Ecology and Evolution, 17, 164–170. 10.1016/S0169-5347(02)02499-0 [DOI] [Google Scholar]
  48. Kueffer, C. (2017). Plant invasions in the Anthropocene. Science, 358, 724–725. 10.1126/science.aao6371 [DOI] [PubMed] [Google Scholar]
  49. Levine, J. M. , & D'Antonio, C. M. (1999). Elton revisited: A review of evidence linking diversity and invasibility. Oikos, 87, 15–26. 10.2307/3546992 [DOI] [Google Scholar]
  50. Lively, C. M. (2010). The effect of host genetic diversity on disease spread. The American Naturalist, 175, E149–E152. 10.1086/652430 [DOI] [PubMed] [Google Scholar]
  51. Lockwood, J. L. , Cassey, P. , & Blackburn, T. (2005). The role of propagule pressure in explaining species invasions. Trends in Ecology and Evolution, 20, 223–228. 10.1016/j.tree.2005.02.004 [DOI] [PubMed] [Google Scholar]
  52. Lockwood, J. L. , Cassey, P. , & Blackburn, T. M. (2009). The more you introduce the more you get: The role of colonization pressure and propagule pressure in invasion ecology. Diversity and Distributions, 15, 904–910. 10.1111/j.1472-4642.2009.00594.x [DOI] [Google Scholar]
  53. MacArthur, R. (1970). Species packing and competitive equilibrium for many species. Theoretical Population Biology, 1, 1–11. 10.1016/0040-5809(70)90039-0 [DOI] [PubMed] [Google Scholar]
  54. MacArthur, R. , & Levins, R. (1967). Limiting similarity convergence and divergence of coexisting species. The American Naturalist, 101, 377–385. 10.1086/282505 [DOI] [Google Scholar]
  55. Mahoney, P. J. , Beard, K. H. , Durso, A. M. , Tallian, A. G. , Long, A. L. , Kindermann, R. J. , … Mohn, H. E. (2015). Introduction effort, climate matching and species traits as predictors of global establishment success in non‐native reptiles. Diversity and Distributions, 21, 64–74. 10.1111/ddi.12240 [DOI] [Google Scholar]
  56. Melbourne, B. A. , Cornell, H. V. , Davies, K. F. , Dugaw, C. J. , Elmendorf, S. , Freestone, A. L. , … Yokomizo, H. (2007). Invasion in a heterogeneous world: Resistance, coexistence or hostile takeover? Ecology Letters, 10, 77–94. 10.1111/j.1461-0248.2006.00987.x [DOI] [PubMed] [Google Scholar]
  57. Mitchell, C. E. , Agrawal, A. A. , Bever, J. D. , Gilbert, G. S. , Hufbauer, R. A. , Klironomos, J. N. , … Vazquez, D. P. (2006). Biotic interactions and plant invasions. Ecology Letters, 9, 726–740. 10.1111/j.1461-0248.2006.00908.x [DOI] [PubMed] [Google Scholar]
  58. Prinzing, A. , Durka, W. , Klotz, S. , & Brandl, R. (2001). The niche of higher plants: Evidence for phylogenetic conservatism. Proceedings of the Royal Society B: Biological Sciences, 268, 2383–2389. 10.1098/rspb.2001.1801 [DOI] [PMC free article] [PubMed] [Google Scholar]
  59. Pulliam, H. R. (2000). On the relationship between niche and distribution. Ecology Letters, 3, 349–361. 10.1046/j.1461-0248.2000.00143.x [DOI] [Google Scholar]
  60. Pyšek, P. , & Richardson, D. M. (2007). Traits associated with invasiveness in alien plants: Where do we stand? In Nentwig W. E. (Ed.), Biological invasions (pp. 97–125). Berlin, Germany: Springer‐Verlag. [Google Scholar]
  61. R Development Core Team (2018). R: A language and environment for statistical computing. Vienna, Austria: R Foundation for Statistical Computing; http://www.R‐project.org [Google Scholar]
  62. Rejmánek, M. , & Richardson, D. M. (1996). What attributes make some plant species more invasive? Ecology, 77, 1655–1661. 10.2307/2265768 [DOI] [Google Scholar]
  63. Ricciardi, A. , & Atkinson, S. K. (2004). Distinctiveness magnifies the impact of biological invaders in aquatic ecosystems. Ecology Letters, 7, 781–784. 10.1111/j.1461-0248.2004.00642.x [DOI] [Google Scholar]
  64. Richards, C. L. , Bossdorf, O. , Muth, N. Z. , Gurevitch, J. , & Pigliucci, M. (2006). Jack of all trades, master of some? On the role of phenotypic plasticity in plant invasions. Ecology Letters, 9, 981–993. 10.1111/j.1461-0248.2006.00950.x [DOI] [PubMed] [Google Scholar]
  65. Richardson, D. M. , Allsopp, N. , D'Antonio, C. M. , Milton, S. J. , & Rejmanek, M. (2000). Plant invasions—The role of mutualisms. Biological Reviews, 75, 65–93. 10.1017/S0006323199005435 [DOI] [PubMed] [Google Scholar]
  66. Richardson, D. M. , & Pyšek, P. (2008). Fifty years of invasion ecology—The legacy of Charles Elton. Diversity and Distributions, 14, 161–168. 10.1111/j.1472-4642.2008.00464.x [DOI] [Google Scholar]
  67. Sala, O. E. , Chapin, F. S. , Armesto, J. J. , Berlow, E. , Bloomfield, J. , Dirzo, R. , … Wall, D. H. (2000). Biodiversity—Global biodiversity scenarios for the year 2100. Science, 287, 1770–1774. 10.1126/science.287.5459.1770 [DOI] [PubMed] [Google Scholar]
  68. Schulz, A. N. , Lucardi, R. D. , & Marsico, T. D. (2019). Successful invasions and failed biocontrol: The role of antagonistic species Interactions. BioScience, 69, 711–724. 10.1093/biosci/biz075 [DOI] [Google Scholar]
  69. Settele, J. , Hammen, V. , Hulme, P. , Karlson, U. , Klotz, S. , Kotarac, M. , … Kuhn, I. (2005). ALARM: Assessing LArge‐scale environmental Risks for biodiversity with tested Methods. Gaia, 14, 69–72. 10.14512/gaia.14.1.20 [DOI] [Google Scholar]
  70. Shea, K. , & Chesson, P. (2002). Community ecology theory as a framework for biological invasions. Trends in Ecology and Evolution, 17, 170–176. 10.1016/S0169-5347(02)02495-3 [DOI] [Google Scholar]
  71. Sher, A. A. , & Hyatt, L. A. (1999). The disturbed resource‐flux invasion matrix: A new framework for patterns of plant invasion. Biological Invasions, 1, 107–114. 10.1023/A:1010050420466 [DOI] [Google Scholar]
  72. Simberloff, D. , & Gibbons, L. (2004). Now you see them, now you don't—Population crashes of established introduced species. Biological Invasions, 6, 161–172. 10.1023/B:Binv.0000022133.49752.46 [DOI] [Google Scholar]
  73. Simberloff, D. , & Holle, B. V. (1999). Positive interactions of nonindigenous species: Invasional meltdown? Biological Invasions, 1, 21–32. [Google Scholar]
  74. Sommer, S. (2005). The importance of immune gene variability (MHC) in evolutionary ecology and conservation. Frontiers in Zoology, 2, 16. 10.1186/1742-9994-2-16 [DOI] [PMC free article] [PubMed] [Google Scholar]
  75. Stohlgren, T. J. , Jarnevitch, C. , & Chong, G. W. (2006). Scale and plant invasions: A theory of biotic acceptance. Preslia, 78, 405–426. [Google Scholar]
  76. Swanson, D. R. (1986). Undiscovered public knowledge. Library Quarterly, 56, 103–118. 10.1086/601720 [DOI] [Google Scholar]
  77. te Beest, M. , Le Roux, J. J. , Richardson, D. M. , Brysting, A. K. , Suda, J. , Kubešová, M. , & Pysek, P. (2012). The more the better? The role of polyploidy in facilitating plant invasions. Annals of Botany, 109, 19–45. 10.1093/aob/mcr277 [DOI] [PMC free article] [PubMed] [Google Scholar]
  78. Thuiller, W. , Gallien, L. , Boulangeat, I. , de Bello, F. , Munkemuller, T. , Roquet, C. , & Lavergne, S. (2010). Resolving Darwin's naturalization conundrum: A quest for evidence. Diversity and Distributions, 16, 461–475. 10.1111/j.1472-4642.2010.00645.x [DOI] [Google Scholar]
  79. Trujillo, C. M. , & Long, T. M. (2018). Document co‐citation analysis to enhance transdisciplinary research. Science Advances, 4, e1701130. 10.1126/sciadv.1701130 [DOI] [PMC free article] [PubMed] [Google Scholar]
  80. van Kleunen, M. , Weber, E. , & Fischer, M. (2010). A meta‐analysis of trait differences between invasive and non‐invasive plant species. Ecology Letters, 13, 235–245. 10.1111/j.1461-0248.2009.01418.x [DOI] [PubMed] [Google Scholar]
  81. Vaz, A. S. , Kueffer, C. , Kull, C. A. , Richardson, D. M. , Schindler, S. , Muñoz‐Pajares, A. J. , … Honrado, J. P. (2017). The progress of interdisciplinarity in invasion science. Ambio, 46, 428–442. 10.1007/s13280-017-0897-7 [DOI] [PMC free article] [PubMed] [Google Scholar]
  82. Vidal‐Garcia, M. , & Keogh, J. S. (2017). Invasive cane toads are unique in shape but overlap in ecological niche compared to Australian native frogs. Ecology and Evolution, 7, 7609–7619. 10.1002/ece3.3253 [DOI] [PMC free article] [PubMed] [Google Scholar]
  83. Wang, T. , Hu, J. T. , Wang, R. Q. , Liu, C. H. , & Yu, D. (2018). Tolerance and resistance facilitate the invasion success of Alternanthera philoxeroides in disturbed habitats: A reconsideration of the disturbance hypothesis in the light of phenotypic variation. Environmental and Experimental Botany, 153, 135–142. 10.1016/j.envexpbot.2018.05.011 [DOI] [Google Scholar]
  84. Weiher, E. , & Keddy, P. A. (1995). Assembly rules, null models, and trait dispersion—New questions front old patterns. Oikos, 74, 159–164. 10.2307/3545686 [DOI] [Google Scholar]
  85. Wickham, H. (2007). Reshaping data with the reshape package. Journal of Statistical Software, 21, 12. http://www.jstatsoft.org/v21/i12/ [Google Scholar]
  86. Williamson, M. H. , & Brown, K. C. (1986). The analysis and modelling of British invasions. Philosophical Transactions of the Royal Society of London Series B, Biological Sciences, 314, 505–522. 10.1098/rstb.1986.0070 [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

TABLE S1

Appendix S1

Data Availability Statement

The data created in this study and underlying the presented analyses are freely available online in the Supporting Information accompanying this publication.


Articles from Global Ecology and Biogeography are provided here courtesy of Wiley

RESOURCES