30.10.2012 Views

Proceedings of the Seventh Mountain Lion Workshop

Proceedings of the Seventh Mountain Lion Workshop

Proceedings of the Seventh Mountain Lion Workshop

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

92 REDUCING PUMA ATTACKS · Fitzhugh et al.<br />

cat.<br />

What was puma doing with its feet at time<br />

<strong>of</strong> first sighting?<br />

Bounding toward me.<br />

Victim behavior just after first sighting?<br />

Putting rifle to shoulder and firing.<br />

Were <strong>the</strong>re signs <strong>of</strong> aggression by puma?<br />

The cougar was charging me, full speed<br />

ahead, which seemed pretty aggressive to<br />

me at <strong>the</strong> time.<br />

Did victim fight back?<br />

Yes.<br />

How?<br />

I shot <strong>the</strong> puma in <strong>the</strong> throat/chest.<br />

Puma response:<br />

Puma rolled and died.<br />

Was puma injured by victim?<br />

Yes, severely.<br />

Quality <strong>of</strong> Data<br />

Some accounts are not included in this<br />

analysis. The 224 attacks and 155<br />

encounters we analyze do not include 14<br />

incidents for which we believe additional<br />

investigation is needed to validate <strong>the</strong>ir<br />

accuracy. Nor do we include 8 o<strong>the</strong>r<br />

incidents we suspect, but cannot prove, are<br />

duplicates <strong>of</strong> incidents included in <strong>the</strong> tally.<br />

In addition, we have 10 more reports that we<br />

decided not to use because <strong>the</strong>y included too<br />

little information or were <strong>of</strong> doubtful<br />

validity. Our data do include incidents that<br />

do not meet Beier’s criteria, but we kept<br />

those separate in order not to invalidate<br />

comparison with Beier’s (1991) findings. As<br />

we analyze data more completely, more <strong>of</strong><br />

<strong>the</strong> incidents may be excluded, primarily for<br />

lack <strong>of</strong> information. Our files also include<br />

several accounts that have recently come to<br />

our attention that are not yet entered in <strong>the</strong><br />

database and are not included in this paper.<br />

These latter data, and additional details from<br />

<strong>the</strong> accounts we have analyzed will be<br />

included in a later, more complete treatment.<br />

As already mentioned, we included all<br />

<strong>the</strong> accounts we have discovered, and we<br />

tried to estimate <strong>the</strong> validity <strong>of</strong> each. The<br />

PROCEEDINGS OF THE SEVENTH MOUNTAIN LION WORKSHOP<br />

editor <strong>of</strong> Outdoor Life, from 1897 to 1925,<br />

asked his readers to provide accounts <strong>of</strong><br />

puma attacks on humans. He <strong>the</strong>n tried to<br />

verify <strong>the</strong> accuracy <strong>of</strong> each account,<br />

generally without success. In each case, he<br />

was ei<strong>the</strong>r unable to locate <strong>the</strong> respondent,<br />

or <strong>the</strong> knowledgeable people from <strong>the</strong> area<br />

where <strong>the</strong> attack was supposed to have<br />

occurred claimed no knowledge <strong>of</strong> it<br />

(Anonymous 1925, cited by Beier 1991).<br />

During this same period, Forest and Stream,<br />

which became Field and Stream, also<br />

printed numerous personal accounts <strong>of</strong><br />

encounters with pumas. At this time, we<br />

have been able to locate only 1 reference to<br />

incidents that may have been confirmed<br />

(Marsh 1917), or failed confirmation, by<br />

Outdoor Life (Anonymous 1917). We are<br />

aware <strong>of</strong> one, and perhaps three fraudulent<br />

accounts in recent years, and we also<br />

questioned <strong>the</strong> validity <strong>of</strong> one unusual<br />

account that we later found had been<br />

confirmed by an agency. We recently tried,<br />

unsuccessfully, to obtain agency<br />

confirmation <strong>of</strong> an account, only later to find<br />

that <strong>the</strong> confirmation had been provided to<br />

Etling several years earlier. Therefore, <strong>the</strong><br />

verifications <strong>the</strong>mselves can be erroneous in<br />

ei<strong>the</strong>r direction. It is possible that we have<br />

analyzed a few spurious reports, but if so,<br />

<strong>the</strong>ir effect on our findings should be minor.<br />

We have placed our 379 useful incidents<br />

in categories <strong>of</strong> similar types <strong>of</strong> incidents<br />

and levels <strong>of</strong> reliability. The 108 fatal and<br />

non-fatal incidents that meet Beier’s (1991)<br />

criteria may be considered to be a complete<br />

count <strong>of</strong> well-defined and verified attacks.<br />

(See a more complete defense <strong>of</strong> this<br />

assumption in <strong>the</strong> results and discussion<br />

section). The few verified non-fatal<br />

incidents we may have missed would not<br />

affect group values in an important way.<br />

The 116 o<strong>the</strong>r attacks and 155 encounters<br />

represent nei<strong>the</strong>r a total count nor a<br />

statistical sample, nor do we know anything<br />

about <strong>the</strong> underlying statistical distribution

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!