1980
DOI: 10.1111/j.1095-8312.1980.tb00066.x
|View full text |Cite
|
Sign up to set email alerts
|

On the definition of mimicry

Abstract: 411 operational distinction between crypsis and mimicry is made in terms of the cognitive and perceptual systems of 'signal-receivers'. Cryptic organism specialize i n generating information of the type not attended to or filtered out (reference frame) by the receivers, whereas mimetic organism specialize in producing information (signals) of the type sought out by and of interest to a receiver. Miniici?; is defined in terms of a system of three living organisms, model, mimic and operatoi-(signal-recriver), in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
85
0
1

Year Published

1995
1995
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 130 publications
(86 citation statements)
references
References 15 publications
0
85
0
1
Order By: Relevance
“…In this phenomenon, which has also been termed special resemblance (Cott 1957) or masquerade (Endler 1981), the animal evolves a detailed likeness to some specific, local feature of its envi-ronment (Edmunds 1990, Robinson 1969, Vane-Wright 1980. Pattern mimicry has produced some of the most spectacular examples of protective coloration, such as stick caterpillars (de Ruiter 1952), leaf-mimicking katydids (Castner & Nickle 1995), and leafy seadragons (Connolly et al 2002).…”
Section: Components Of Crypticitymentioning
confidence: 99%
“…In this phenomenon, which has also been termed special resemblance (Cott 1957) or masquerade (Endler 1981), the animal evolves a detailed likeness to some specific, local feature of its envi-ronment (Edmunds 1990, Robinson 1969, Vane-Wright 1980. Pattern mimicry has produced some of the most spectacular examples of protective coloration, such as stick caterpillars (de Ruiter 1952), leaf-mimicking katydids (Castner & Nickle 1995), and leafy seadragons (Connolly et al 2002).…”
Section: Components Of Crypticitymentioning
confidence: 99%
“…These predators tap into existing sensory and perceptual biases in their prey, exploiting their tendency to approach certain stimuli. When the lure resembles another organism and solicits a similar response, the luring tactic is called 'aggressive mimicry' [1,2]. Some aggressive mimics, especially those exploiting sexual signals, are highly specific (sensu [3]), bearing close resemblance to a readily identifiable model.…”
Section: Introductionmentioning
confidence: 99%
“…Mimicry, as de¢ned by Vane-Wright (1980),`involves an organism (the mimic) which simulates signal properties of a second living organism (the model) which are perceived as signals of interest by a third living organism (the operator), such that the mimic gains in ¢tness as a result of the operator identifying it as an example of the model ' (p. 4). Several social parasites use mimicry for exploiting their hosts.…”
Section: Introductionmentioning
confidence: 99%