Jump to ContentJump to Main Navigation
Pollination and Floral Ecology$
Users without a subscription are not able to see the full content.

Pat Willmer

Print publication date: 2011

Print ISBN-13: 9780691128610

Published to University Press Scholarship Online: October 2017

DOI: 10.23943/princeton/9780691128610.001.0001

Show Summary Details
Page of
date: 14 December 2017

Flower Visitors as Cheats and the Plants’ Responses

Flower Visitors as Cheats and the Plants’ Responses

Chapter:
(p.542) Chapter 24 Flower Visitors as Cheats and the Plants’ Responses
Source:
Pollination and Floral Ecology
Author(s):

Pat Willmer

Publisher:
Princeton University Press
DOI:10.23943/princeton/9780691128610.003.0024

This chapter describes some of the kinds of cheating committed by flower visitors and what plants can do to avoid the costs of being cheated. While both plants and visitors have many ways of cheating, the diversity and deviousness of cheating by the plants seem to be substantially greater than the surreptitious stealing and ambushing that goes on in the animals. This is not surprising when considered in terms of the so-called life-dinner principle, and what each participant has at stake. The chapter begins with a discussion of how animals cheat by means of floral theft and thus get rewards without effecting pollination, including nectar theft, pollen theft, and florivory. It then examines three main options for defending plants against theft: physical barriers, chemical deterrents, and bribes. It also explains the overall effects of theft on flowers and concludes with an analysis of floral exploitation by hitchhikers and ambush predators.

Keywords:   cheating, flower visitor, plant, floral theft, pollination, florivory, bribe, flower, hitchhiker, ambush predator

University Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us .