Supplementary Materials

Filling in biodiversity threat gaps

L. N. Joppa, B. O'Connor, P. Visconti, C. Smith, J. Geldmann, M. Hoffmann, J. E. M. Watson, S. H. M. Butchart, M. Virah-Sawmy, B. S. Halpern, S. E. Ahmed, A. Balmford, W. J. Sutherland, M. Harfoot, C. Hilton-Taylor, W. Foden, E. Di Minin, S. Pagad, P. Genovesi, J. Hutton, N. D. Burgess

Materials/Methods, Supplementary Text, Tables, Figures, and/or References

Download Supplement
  • Materials and Methods
  • Supplementary Text
  • Figs. S1 and S2
  • Table S1
  • References
Tables S1 and S2
Table S1. The metadatabase analyzed in this study. The classification keys used in the columns are described in Table S3. Filters are provided to identify which data sets did or did not meet each of our five filters.

Table S2. Information for the Red Listed species analyzed in the chart in the text. This information includes the taxonomy and a binary classification of whether or not a species is threatened by each of the nine classes of threat considered in our manuscript.