Abstract
Like other corvids, food-storing ravens protect their caches from being pilfered by conspecifics by means of aggression and by re-caching. In the wild and in captivity, potential pilferers rarely approach caches until the storers have left the cache vicinity. When storers are experimentally prevented from leaving, pilferers first search at places other than the cache sites. These behaviours raise the possibility that ravens are capable of withholding intentions and providing false information to avoid provoking the storers' aggression for cache protection. Alternatively, birds may refrain from pilfering to avoid conflicts with dominants. Here we examined whether ravens adjust their pilfer tactics according to social context and type of competitors. We allowed birds that had witnessed a conspecific making caches to pilfer those caches either in private, together with the storer, or together with a conspecific bystander that had not created the caches (non-storer) but had seen them being made. Compared to in-private trials, ravens delayed approaching the caches only in the presence of storers. Furthermore, they quickly engaged in searching away from the caches when together with dominant storers but directly approached the caches when together with dominant non-storers. These findings demonstrate that ravens selectively alter their pilfer behaviour with those individuals that are likely to defend the caches (storers) and support the interpretation that they are deceptively manipulating the others' behaviour.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
Introduction
Social life may enhance the foraging efficiency of individuals by allowing them to exploit the knowledge of others (social learning, using public information) and/or the resources made available by others (kleptoparasitism, scrounging; review in Giraldeau and Caraco 2000; Laland 2004). Costs associated with social exploitation may be compensated by benefits through kinship or reciprocity (e.g. Axelrod and Hamilton 1981) as well as by other benefits of group living such as facilitated predator detection (e.g. Bertram 1978; Pulliam et al. 1982). However, if costs consistently exceed the benefits, individuals should develop counter-measures against exploitation, e.g. by getting away from others (Ranta et al. 1996; Barta and Giraldeau 1998) or by withholding information and providing false information (Dawkins and Krebs 1978; Maynard Smith 1979).
Providing no or false information constitutes a form of deception since it leads to the misinterpretation of a situation by one individual as a consequence of the behaviour or signals of the other individual (Whiten and Byrne 1988a, b). Functionally, such a misinterpretation poses costs to the receiver and benefits the deceiver (Semple and McComb 1996; see also Krebs and Dawkins 1984; Mitchell 1986). Byrne and Whiten (1985) introduced the term ‘tactical’ deception to emphasize a contrast between short-term tactics (in which the deception uses elements from an honest counterpart in the individuals' repertoire) and long-term strategies such as inter- and intra-specific mimicry. Such flexible deceptive tactics for social manipulation have been reported mainly for primates (review in Byrne and Whiten 1990; Tomasello and Call 1997). Since constraints imposed by social structure (e.g. risk of detection, need for cooperation; Cheney and Seyfarth 1990a) makes deceptive tactics rare and difficult to study, much of the literature on the topic consists of anecdotes (Whiten and Byrne 1988a, b; Byrne and Whiten 1992). Nevertheless, progress in evaluating the possibility of deception has been made with experimental approaches such as the ‘informed forager’ paradigm (Menzel 1974; Coussi-Korbel 1994; Hirata and Matsuzawa 2001; Ducoing and Thierry 2003), ‘competitive experimenters’ (Woodruff and Premack 1979; Kummer et al. 1996; Mitchell and Anderson 1997; Anderson et al. 2001) or ‘food competition contest’ (Hare et al. 2000, 2001; Fujita et al. 2002), and studies have included some non-primate species (Held et al. 2000, 2002; Bugnyar and Kotrschal 2004; Dally et al. 2005a).
From a cognitive perspective, tactical deception has been assumed to reflect intentions by the deceivers in the sense that individuals want to manipulate others (Whiten and Byrne 1988a, b). However, conclusions about the degree of intentionality, i.e. whether the deception aims to affect the other's behaviour (first-order intentionality) or the other's mental states (second-order intentionality, Dennett 1988; for a different categorization see Mitchell 1986), are speculative and therefore highly debated (e.g. open correspondence to Whiten and Byrne 1988a; Heyes 1998).
Ravens are scavengers that cache temporary surpluses of food and food that is contested by others. In the wild and in captivity, they hide themselves from others while caching (Heinrich and Pepper 1998; Bugnyar and Kotrschal 2002a) in an apparent attempt to prevent conspecifics from learning about their cache locations through observation (Bugnyar and Heinrich 2003). Ravens also protect their caches against pilfering by aggressively chasing off conspecifics that come near their caches and/or by retrieving the food for later re-caching (Heinrich 1999). Thus, pilferers that have seen the making of caches often refrain from approaching those caches as long as storers are present (Bugnyar and Kotrschal 2002a). Furthermore, pilferers that are experimentally given access to the room in which they could previously observe a storer making caches, go directly for those caches when tested in private whereas they engage in short search-bouts at places away from those caches when tested together with the storer. Searching in short bouts and at various places is a typical behaviour for ravens that are ignorant about the location of caches that they have not observed being made (Bugnyar and Heinrich 2005). These findings raise the possibility that pilferers are capable of withholding their intention and/or providing false information to avoid provoking the cache protection of storers. Alternatively, birds could delay approaching and search at places other than the caches simply to avoid conflicts with dominants.
We here discriminated between these possibilities by testing whether ravens adjust their pilfer tactics according to social context and types of competitors. We gave birds who had previously watched a dominant conspecific making caches access to that room (i) in private, (ii) together with the storer, or (iii) together with a dominant conspecific that had not created the caches (non-storer) but that had observed them being made. Thus, in both social treatments, potential pilferers were confronted with dominants that were knowledgeable about cache location. However, one was the storer that was likely to retrieve caches in defence of pilfering whereas the other one was a competitor that was likely to engage in pilfering. Subordinate potential pilferers should not approach the caches when the storer is present but wait for its distraction in order to pilfer without eliciting cache protection. By contrast, if the non-storer is present then the potential pilferer should outrace its competitor because being first at the cache would be the best tactic to get the food reward against the dominant conspecific. Hence, we expected ravens to withhold pilfering and/or provide false information by searching at other places when together with storers but not with non-storers. However, if ravens were simply avoiding conflicts with dominants, they should show those social manoeuvres with both storers and non-storers.
Since ravens are known to kleptoparasite conspecifics at monopolizable food sources as well as at caches (Bugnyar and Kotrschal 2002b, 2004), both dominant storers and non-storers could also be expected to use force to obtain the recovered cache from the focal subjects. To control for possible effects of scrounging, we used small food pieces that could be taken quickly into the beak and/or sublingual pouch (Kijne and Kotrschal 2002). Thus, in the present experiment dominants could easily use force to defend or monopolize cache sites but hardly to steal the food from others after it had been recovered.
Methods
Subjects and setting
Subjects were seven hand-raised ravens (five males, two females; six birds were in their first year of age, one male was in his fourth year), all of which had participated in previous studies on gaze following and food caching (Bugnyar et al. 2004; Bugnyar and Heinrich 2005). Birds were marked with coloured rings for individual identification. They were housed together in an outdoor aviary composed of three sections (section A: 30 m2, section B: ca. 100 m2, section C: three compartments and connecting pathways with a total area of 64 m2; Fig. 1). Sections were separated by wire partition and, in case of section C, by wooden walls containing windows that could be covered with curtains. Sections A and B were equipped with natural vegetation and diverse ground cover (trees, grass; twigs, leaves, soil) whereas compartments of section C (12 m2, 12 m2, and 24 m2) and interconnecting pathways (16 m2) contained only a grass-floor and a few perches. Tests were conducted in section B, potential pilferers were enclosed in section C, and birds that did not participate in a given trial were confined to section A. When experiments were not in progress, doors between compartments were open and birds could freely roam in the entire complex. Birds were fed on their normal diet (meat, milk-products, fruits; Kabicher and Fritz 1996) after daily experiments. Water was provided ad libitum.
Procedure
The general line of testing was the same as in Bugnyar and Heinrich (2005). Tests consisted of a caching trial and a retrieval trial for focal subjects (n=3 trials per treatment). During caching trials, a storer received three pieces of food (meat, 10 g per piece) that it was free to cache in the entire section B. Caching trials were terminated when all food was cached (mean±SE number of caches made per storer: 3.6±0.4) and/or consumed (mean±SE pieces recovered and consumed per storer: 1±0.2) and, on average, lasted for 5(±0.4) min; afterwards, the storer was called out of section B by offering a small treat in the pathways of section C. During every caching trial, the focal subject and its non-storing competitor were enclosed in section C. Each of them was in a compartment with a transparent window and/or in the adjacent pathway from which they had clear view of the storer and the entire section B; the partition between compartments was made of wire mesh so that each bird had full visual access to the other's room (Fig. 1).
Retrieval trials started 5 min after caching trials and lasted for 10 min. During retrieval trials (n=3 trials per treatment), focal subjects were allowed to pilfer the caches either in private or in competition with the storer and non-storer, respectively. In both social treatments, competitors were dominant to the focal subject. The order of treatments as well as the identity of competitors per treatment changed in a pseudo-randomized order. In each treatment, birds were confronted with the same competitor in the first trial and, in case the birds' position in dominance rank hierarchy allowed for more combinations, with different competitors in the second and third trial (e.g. bird with dominance status 2 was tested three times per condition with bird of dominance status 1 as storer and as non-storer; bird with dominant status 6 was tested in each condition first with bird of dominance status 5, then with birds 4 and 3). Dominance status of individuals was known before the onset of the experiments and calculated on the basis of approach-retreat interactions.
Due to the size of the test compartment (section B), video-taping was inappropriate to capture the behaviour of two competitors simultaneously. Therefore, T.B. recorded all data by direct observation, marking cache locations onto pre-drawn sketches of the test compartment and describing behaviours by speaking onto a voice recorder (Olympus Pearlcorder S701). Birds were fully habituated to T.B. taking those types of protocols from a given point outside the aviary which was a standard procedure executed since fledging for 1–3 h per day. During caching trials, he recorded the location of caches, the order in which they were made and the number of immediate recoveries by the storer (see above). During retrieval trials, he measured the number and location of searches by the focal subject (labelled as search-bouts), the time (s) spent searching and the total time elapsed until the first cache was approached <1/2 m and/or successfully pilfered. In addition, he noted all social interactions between subjects in the competitive treatments. Searching was defined as digging in the substrate with the beak and/or looking into holes and under objects that were lifted with the beak. Searches conducted <1/2 m near a cache were regarded as pilfer attempts; searches conducted >2 m away from a cache were referred to as ‘non-cache sites’. (Searches conducted between 1/2 m and 2 m of a cache comprised only 4±3% of all search-bouts; those cases were excluded from the analysis). Videos made in the pilot phase (in which we had two ravens let out into section B and both cached and pilfered simultaneously) were used to validate the reliability of data collection. T.B. and a person familiar to the ravens but not involved in the present experiment showed a high level of agreement (Cohen's K=0.87) on their ratings of behavioural categories on that video material.
Analysis
Analysis concentrated on the period until the focal subjects' first pilfer attempt. Only this early period allowed a standardized comparison between trials and treatments because the subjects' behaviour after the first pilfer attempt was affected by the fate of the cache (i.e. whether or not it was pilfered, recovered, or still in place) and by the total number of caches available (which was due to the storer's performance in the caching trial). Pilfer success was calculated as proportion of first pilfer attempts that resulted in gaining the food. Failure of pilfering could be caused by not finding the cache despite of searching within a range of 1/2 m, not finding the food because the cache has already been emptied by the storer, or because of aggression by the storer or non-storer.
We used Friedman test and Wilcoxon signed-ranks test on the individuals' mean values across trials to compare the birds' performance between treatments. When applying Friedman test (k=3 treatments), we subsequently administered the multiple comparison method that is specific to this test (Siegel and Castellan 1988, pp. 180–181). Since the number of comparisons was equal to k/[(k−1)/2], the value of z evaluated from Table A in the appendix was 2.394 and the calculated critical value was computed to be 8.29. Differences between treatments were considered significant if the difference between the rank sums exceeded this critical value (Siegel and Castellan 1988). When applying Wilcoxon test (k=2 treatments), we calculated P-values by hand (Sokal and Rohlf 1995, Table V) because standard software packages may give incorrect P-values with small sample sizes (Mundry and Fischer 1998). For all analysis, tests were two-tailed and alpha was set at 0.05.
Results
We found a significant difference in the focal subjects' mean latency to show the first pilfer attempt (approach a cache <1/2 m) between treatments (Friedman: χ2=8.33, df=2, P=0.016; Fig. 2). Specifically, ravens delayed pilfering when tested together with a dominant storer than when tested alone (difference between rank sums = 10, critical value = 8.29). In contrast, the birds' latency did not differ significantly from the in-private treatment when tested with a dominant non-storer (difference between rank sums = 5). However, there was also no significant difference between the storer and non-storer treatments (difference between rank sums = 5).
We also found ravens repeatedly searching at non-cache sites (>2 m away from caches) before they started the first pilfer attempt. Both the mean time spent searching and the mean number of search-bouts differed between treatments (Friedman: search time: χ2=11.57, df=2, P=0.003, Fig. 3a; number of bouts: χ2=11.57, df=2, P=0.003, Fig. 3b). Both parameters were significantly increased in the tests with a storer compared to with a non-storer (difference between rank sums = 11.5, critical value = 8.29), whereas there was no statistical difference between the tests with a storer and in private (difference between rank sums = 6.5) and between the tests with a non-storer and in private (difference between rank sums = 5). Thus, ravens were likely to first search at places away from the actual caches when being together with a dominant storer whereas they directly attempted pilfering when being together with a dominant non-storer (Fig. 3a and b). Interestingly, the mean latency to start searching at non-cache sites in the storer treatment was shorter than the latency to start pilfering in the non-storer treatment (mean±SE: 14±2 s vs. 52±8 s; Wilcoxon: n=6, T=0, P=0.031).
Storers were rarely attracted to non-cache sites where focal subject were searching (Table 1) but were likely to orient in the direction of their caches when focal subjects eventually approached <2 m to those caches, i.e. they interrupted their activities and/or flew back to perch in the vicinity (ca. 2–3 m) of the caches (Table 1). In sharp contrast to non-storers, they never retrieved the food without experiencing another raven nearby the caches (Table 1). Once storers oriented towards caches, focal subjects could quickly dash for the cache (in 11% of the cases) or instantly stop approaching and leave the cache's vicinity for later coming back (in 89% of the cases; Table 1). In contrast, birds never showed any stop or delay of pilfer attempts in response to non-storers. They either tried to outrace the competitor (in 57% of the cases) or went for another cache (in 43% of the cases). The number of agonistic interactions occurring before the first pilfer attempt did not differ between storer and non-storer treatments (Wilcoxon: n=6, T=8.5, P>0.2).
The likelihood of ravens getting the food in their first pilfer attempts differed between treatments (Friedman: χ2=6.9, df=2, P=0.032). Although none of the post hoc pair-wise comparisons revealed a significant difference, there was a tendency of pilfer success being higher when in private than when with dominant storers (difference between rank sums = 8; critical value = 8.29) and when in private than when with dominant non-storers (difference between rank sums = 7; Fig. 4). Interestingly, failure in pilfering was mainly due to aggression when together with storers (50±14% of the cases) whereas it was due to not finding the caches despite of searching within a range of 1/2 m (56±20%) and searching at caches already emptied during caching trials (30±16%) when together with non-storers.
Discussion
These results corroborate our previous observations and experimental findings that ravens delay pilfering and engage in searching at places other than the cache sites when confronted with those individuals that they have observed making the caches (Heinrich 1999; Bugnyar and Kotrschal 2002a; Bugnyar and Heinrich 2005). However, birds do not show these responses with dominants that had not created the caches but–like storers–know about their locations. This situation-dependent use of behaviours supports the idea that pilferers tactically manipulate storers by withholding intention and providing false information.
A parsimonious way of explaining the ‘tactical’ use of behaviours would be a combination of simple decision rules such as avoiding dominants and attending to the other's behaviour. For instance, focal subjects could inhibit pilfering with any dominant conspecific, pay attention to which cache it moves towards and then go for a cache not chosen by the competitor. When together with storers, birds might have problems in gaining local cues since storers usually stay away from their caches when conspecifics do not come close (Bugnyar and Heinrich 2005). Pilferers thus should have difficulties in deciding which caches are ‘safe’ to approach with storers rather than with non-storers. Searching at places other than the caches may result as a kind of displacement behaviour that eventually distracts storers and, as a by-product, functions as deceptive action.
Although plausible, we consider this scenario as unlikely mainly because the ravens showed a relatively quick response to storers and not, as would be predicted by the behavioural cueing model, to non-storers. Pilferers started searching at non-cache sites with storers about twice as early as they started pilfering with non-storers. Furthermore, pilferers always stayed away from cache sites when becoming active with storers but not with non-storers. This is impressive because storers never showed any object- or location-related activities that could guide the pilferers' behaviour in the beginning (Table 1). Pilferers thus appear to discriminate instantly between different types of competitors, i.e. individuals they have seen making caches and those that they have seen as bystanders at caching. These findings add to the increasing body of evidence that group foraging corvids such as ravens (Bugnyar and Heinrich 2005), scrub-jays (Aphelocoma california, Dally et al. 2005a, b) and magpies (Pica pica, Prior and Güntürkün, personal communication) take into account the identity of individuals present at caching and later use this personalized information in competition for those caches. That is, they behave logically in the social realm (Watanabe and Huber 2006).
Certainly, memory for particular individuals at particular sites at caching is only one component for successful pilfering (Heinrich 1999; Emery and Clayton 2001; Dally et al. 2005a). Attending to the other's behaviour, specifically in the vicinity of caches, seems to be a crucial factor for timing the pilfer attempts. Pilferers appear to take into account whether storers are attentive or occupied with other activities (e.g. handling objects, drinking, singing) and how they respond to others approaching their caches (i.e. whether or not they return instantly to their defence). When together with non-storers, pilferers may use the other's behaviour to judge the necessity of speeding up pilfering and/or for choosing an alternative cache they could potentially go for.
The quick adjustment of pilfer behaviour to different types of competitors suggests that ravens understand that storers are likely to defend caches against pilfering whereas non-storers are likely to show pilfering. It is conceivable that such contingencies as well as the appropriate responses are learned during social interactions in everyday life (own unpublished data; see also Emery and Clayton 2001). In this respect it is noteworthy that ravens are capable of adjusting their pilfer behaviour according to context which sometimes affords them showing similar responses to different types of competitors and different responses to the same type of competitor, respectively. For instance, delaying could be an appropriate response not only to storers but also to dominant non-storers when those have not seen the caching and thus are ignorant about the cache locations. Those dominants are unlikely to find the caches but may pose a threat of stealing the food at pilfering. Indeed ravens have been shown to delay pilfering with ignorant non-storers similarly as they do with storers; still, they hardly engage in searching away from caches with any type of non-storer (Bugnyar and Heinrich 2005).
The tactical use of delaying and searching away from the caches may provide an indirect hint for a certain degree of intentionality on side of the pilferers, in the sense that they want storers not to go back and recover their caches. Hence, birds would likely aim at manipulating the others' behaviour (first-order intentionality; Dennett 1988). Searching at places other than the caches could be interpreted as an attempt of distracting the storer's attention and/or leading the storer away from the caches (Whiten and Byrne 1988b; Bugnyar and Kotrschal 2004). However, this does not necessarily indicate that pilferers want storers to believe that there is something of interest at other places and thus aim at affecting their mental states (second-order intentionality, theory of mind; Premack and Woodruff 1978). Those manoeuvres could be learned and/or could be responses to subtle behavioural cues given by the competitor (Cheney and Seyfarth 1990b; Tomasello and Call 1997; Povinelli 2001). A representation of states in the physical world (Heyes 1998) would thus be a sufficient cognitive framework for explaining the manipulative behaviours of pilfering ravens, as it is the case for most reports on tactical deception in non-human animals (e.g. Coussi-Korbel 1994; Kummer et al. 1996; Mitchell and Anderson 1997; Held et al. 2002; Ducoing and Thierry 2003).
Nevertheless, there is evidence that ravens, like some other corvids (review in Emery and Clayton 2004a, b), show a sophisticated understanding of the others' visual perception (Bugnyar et al. 2004; Bugnyar and Heinrich 2005) raising the possibility that they could be capable of representing (some of) the others' mental states (Emery et al. 2004; Emery and Clayton 2004a, b). Given the complex interactions over food caches with individual ravens mutually playing the roles of storers and pilferers and the strong effects of observational spatial memory on finding the others' caches, we propose that those skills could have evolved primarily for judging competitors, i.e. whether those intend to defend or pilfer caches, whether those can or cannot see the caching, and whether those are likely knowledgeable or ignorant about cache locations. Although deceptive manoeuvres do not require higher-order intentionality, they could potentially be affected by those complex socio-cognitive skills (see also the concepts of intermediate goals and building blocks of deception; Hauser 1997; Güzeldere et al. 2002).
A requisite of tactical deception is that the behaviour results in benefits to the deceiver and costs to the deceived (Byrne and Whiten 1985; Semple and McComb 1996). In contrast to our findings in previous studies (Bugnyar and Kotrschal 2004; Bugnyar and Heinrich 2005), we could not find any advantage of social manipulation in this study. Pilfer success with dominant storers was low and comparable to that with dominant non-storers. Possibly the pilfer tactics did not pay off in this particular setup because storers could concentrate on defending their caches. Under more naturalistic situations, storers would have the choice of getting new loads of food for making further caches or staying and defending already made caches (Heinrich and Pepper 1998). Withholding pilfer-intention and/or providing misleading information about cache location should then affect the storers' decision to the advantage of the pilferers.
Taken together, we found that ravens alter their pilfer behaviour with dominants that have made the caches (storers) compared to with dominants that have only seen the caches being made (non-storers), rendering the ‘avoidance of conflict’ hypothesis unlikely. Birds applied different tactics (initially not approach caches but search at non-cache sites with storers vs. directly go for caches with non-storers) already before their competitors started acting, suggesting that their differentiation was not simply the outcome of different behaviours shown by the competitors. Still, behavioural cueing appears to be important for judging the appropriate timing for pilfering and to respond to the protective tactics of storers. We thus interpret the withholding of pilfering and the searching at non-cache sites as an attempt to manipulate the storers' behaviour.
References
Anderson JR, Vick S-J, Kuroshima H, Kuwahatan H, Fujita K (2001) Training squirrel monkeys (Saimiri scriureus) to deceive: acquisition and analysis of behaviour toward cooperative and competitive trainers. J Comp Psychol 115:282–293
Axelrod R, Hamilton WD (1981) The evolution of cooperation. Science 211:1390–1396
Barta A, Giraldeau L-A (1998) The effect of dominance hierarchy on the use of alternative foraging tactics: a phenotype-limited producer–scrounger game. Behav Ecol Sociobiol 42:217–223
Bertram BCR (1978) Living in groups: predators and prey. In: Krebs JR, Davies NB (eds) Behavioral ecology: an evolutionary approach, 1st edn. Blackwell, Oxford, pp 64–96
Bugnyar T, Heinrich B (2003) Hiding in food caching ravens, Corvus corax. Rev Etol Suppl 5:57
Bugnyar T, Heinrich B (2005) Ravens, Corvus corax, differentiate between knowledgeable and ignorant competitors. Proc R Soc Lond B 272:1641–1646
Bugnyar T, Kotrschal K (2002a) Observational learning and the raiding of food caches in ravens, Corvus corax: is it “tactical” deception? Anim Behav 64:185–195
Bugnyar T, Kotrschal K (2002b) Scrounging tactics in free-ranging ravens. Ethology 108:993–1009
Bugnyar T, Kotrschal K (2004) Leading a conspecific away from food in ravens, Corvus corax? Anim Cogn 7:69–76
Bugnyar T, Stöwe M, Heinrich B (2004) Ravens, Corvus corax, follow gaze direction of humans around obstacles. Proc R Soc Lond B 271:1331–1336
Byrne RW, Whiten A (1985) Tactical deception of familiar individuals in baboons (Papio ursinus). Anim Behav 33:669–672
Byrne RW, Whiten A (1990) Tactical deception in primates: the 1990 database. Primate Rep 27:1–101
Byrne RW, Whiten A (1992) Cognitive evolution in primates: evidence from tactical deception. Man 27:609–627
Cheney DL, Seyfarth R (1990a) How monkeys see the world: inside the mind of another species. University of Chicago Press, Chicago
Cheney DL, Seyfarth R (1990b) Attending to behavior versus attending to knowledge: examining monkeys’ attribution of mental states. Anim Behav 40:742–753
Coussi-Korbel S (1994) Learning to outwit a competitor in mangabeys (Cercocebus torquatus torquatus). J Comp Psychol 108:164–171
Dally JM, Emery NJ, Clayton NS (2005a) Cache protection strategies by Western scrub-jays (Aphelocoma californica): implications for social cognition. Anim Behav 70:1251–1263
Dally JM, Emery NJ, Clayton NS (2005b) The social suppression of caching in Western scrub-jays (Aphelocoma californica). Behaviour 142:961–977
Dawkins R, Krebs JR (1978) Animal signals: information or manipulation? In: Krebs JR, Davies NB (eds) Behavioral ecology: an evolutionary approach, 1st edn. Blackwell, Oxford, pp 282–309
Dennett DC (1988) The intentional stance in theory and practise. In: Byrne RW, Whiten A (eds) Machiavellian intelligence: social expertise and the evolution of intellect in monkeys, apes and humans. Oxford University Press, Oxford, pp 180–202
Ducoing AM, Thierry B (2003) Withholding information in semifree-ranging tonkean macaques (Macaca tonkeana). J Comp Psychol 117:67–75
Emery NJ, Clayton NS (2001) Effects of experience and social context on prospective caching strategies by scrub jays. Nature 414:443–446
Emery NJ, Clayton NS (2004a) The mentality of crows: convergent evolution of intelligence in corvids and apes. Science 306:1903–1907
Emery NJ, Clayton NS (2004b) Comparing the complex cognition of birds and primates. In: Rogers LJ, Kaplan G (eds) Comparative vertebrate cognition: are primates superior to non-primates? Kluwer Academic, Hague, The Netherlands, pp 3–55
Emery NJ, Dally JM, Clayton NS (2004) Western scrub-jays (Aphelocoma californica) use cognitive strategies to protect their caches from thieving conspecifics. Anim Cogn 7:37–43
Fujita K, Kuroshima H, Masuda T (2002) Do tufted capuchin monkeys (Cebus apella) spontaneously deceive opponents? A preliminary analysis of an experimental food-competition contest between monkeys. Anim Cogn 5:19–25
Giraldeau L-A, Caraco T (2000) Social foraging theory. Princeton University Press, Princeton New Jersey
Güzeldere G, Nahmias E, Deaner R (2002) Darwin's continuum and the building blocks of deception. In: Bekoff M, Allen C, Burghardt GM (eds) The cognitive animal. Empirical and theoretical perspectives on animal cognition. MIT Press, Cambridge, MA, pp 353—362
Hare B, Call J, Agnetta B, Tomasello M (2000) Chimpanzees know what conspecifics do and do not see. Anim Behav 59:771–785
Hare B, Call J, Tomasello M (2001) Do chimpanzees know what conspecifics know? Anim Behav 61:139–151
Hauser MD (1997) Minding the behaviour of deception. In: Whiten A, Byrne RW (eds) Machiavellian intelligence II: Extensions and evaluations. Cambridge University Press, Cambridge, UK, pp 112–143
Heinrich B (1999) Mind of the raven. Harper-Collins, New York
Heinrich B, Pepper J (1998) Influence of competitors on caching behavior in common ravens, Corvus corax. Anim Behav 56:1083–1090
Held S, Mendl M, Devereux C, Byrne RW (2000) Social tactics of pigs in a competitive foraging task: the “informed forager paradigm”. Anim Behav 59:569–576
Held S, Mendl M, Devereux C, Byrne RW (2002) Foraging pigs alter their behavior in response to exploitation. Anim Behav 64:157–166
Heyes CM (1998) Theory of mind in nonhuman primates. Behav Brain Sci 21:101–148
Hirata S, Matsuzawa T (2001) Tactics to obtain a hidden food item in chimpanzee pairs (Pan troglodythes). Anim Cogn 4: 285–295
Kabicher G, Fritz J (1996) Handaufzucht von Kolkraben. ÖKO-L 18:21–28
Kijne M, Kotrschal K (2002) Neophobia affects choice of food-item size in group foraging common ravens (Corvus corax). Acta Ethol 5:13–18
Krebs JR, Dawkins R (1984) Animal signals: mind-reading and manipulation. In: Krebs JR, Davies NB (eds) Behavioral ecology: an evolutionary approach, 2nd edn. Blackwell, Oxford, pp 380–402
Kummer H, Anzenberger G, Hemelrijk CK (1996) Hiding and perspective taking in long-tailed macaques (Macaca fascicularis). J Comp Psychol 110:97–102
Laland KN (2004) Social learning strategies. Learn Behav 32:4–14
Maynard Smith J (1979) Game theory and the evolution of behaviour. Proc R Soc Lond B 205:475–488
Menzel EW Jr (1974) A group of young chimpanzees in a one-acre field: leadership and communication. In: Schrier AM, Stollnitz F (eds) Behavior of nonhuman primates, vol 5. Academic Press, San Diego, CA, pp 83–153
Mitchell RW (1986) A framework for discussing deception. In: Mitchell RW, Thompson NS (eds) Deception: perspectives on human and non-human deceit. State University of New York Press, Albany, NY, pp 3–10
Mitchell RW, Anderson JR (1997) Pointing, withholding information, and deception in capuchin monkeys. J Comp Psychol 114:351–361
Mundry R, Fischer J (1998) Use of statistical programs for nonparametric tests of small samples often leads to incorrect P values: examples from Animal Behaviour. Anim Behav 56:256–259
Povinelli DJ (2001) On the possibilities of detecting intentions prior to understanding them. In: Malle B, Baldwin D, Moses L (eds) Intentionality: a key to human understanding. MIT Press, Cambridge, MA, pp 225–248
Premack D, Woodruff G (1978) Does the chimpanzee have a theory of mind? Behav Brain Sci 1:515–526
Pulliam HR, Pyke GH, Caraco T (1982) The scanning behavior of juncos: a game-theoretical approach. J Theor Biol 95:89–103
Ranta E, Peuhkuri N, Laurila A, Rita H, Metcalfe NB (1996) Producers, scroungers and foraging group structure. Anim Behav 51:171–175
Semple S, McComb K (1996) Behavioral deception. Tree 11:434—437
Siegel S, Castellan NJ (1988) Nonparametric statistics for the behavioural sciences, 2nd edn. McGraw Hill, New York
Sokal RR, Rohlf FJ (1995) Biometry, 3rd edn. Freeman, New York
Tomasello M, Call J (1997) Primate cognition. Oxford University Press, New York
Watanabe S, Huber L (2006) Animal logics: decision in the absence of human language. Anim Cogn DOI 10.1007/s10071-006-0043-6
Whiten A, Byrne RW (1988a) Tactical deception in primates. Behav Brain Sci 11:233–273
Whiten A, Byrne RW (1988b) The manipulation of attention in primate tactical deception. In: Byrne RW, Whiten A (eds) Machiavellian intelligence: social expertise and the evolution of intellect in monkeys, apes and humans. Oxford University Press, Oxford, pp 211–223
Woodruff G, Premack D (1979) Intentional communication in the chimpanzee: the development of deception. Cognition 7:333–362
Acknowledgements
We thank M. Stöwe for assistance and R. Biegler, M. Bouton, G. Gaydon, C. M. Heyes, L. Huber, K. Kotrschal, I. M. Pepperberg, Chris Schloegl, and three anonymous referees for valuable comments. T. B. was funded by Erwin-Schrödinger grants J2064, J2225 and R31-B03 of the Austrian Science Fund. Permits for ravens include U.S. Federal Fish and Wildlife Permit Number MB689376-0, State of Maine Department of Inland Fisheries and Wildlife Permit 22077, and Vermont Fish and Wildlife Department Scientific Collecting Permit. The experiment described here was approved by the Institutional Animal Care and Use Committee at the University of Vermont (on November 1, 2002, Protocol No. 01–054), USA, where it was carried out.
Author information
Authors and Affiliations
Corresponding author
Additional information
This contribution is part of the special issue “Animal Logics” (Watanabe and Huber 2006).
Rights and permissions
About this article
Cite this article
Bugnyar, T., Heinrich, B. Pilfering ravens, Corvus corax, adjust their behaviour to social context and identity of competitors. Anim Cogn 9, 369–376 (2006). https://doi.org/10.1007/s10071-006-0035-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10071-006-0035-6