Social information allows the rapid dissemination of novel information among individuals. However, an individual’s ability to use information is likely to be dependent on phenotypic constraints operating at three successive steps: acquisition, application, and exploitation. We tested this novel framework by quantifying the sequential process of social information use with experimental food patches in wild baboons ( Papio ursinus). We identified phenotypic constraints at each step of the information use sequence: peripheral individuals in the proximity network were less likely to acquire and apply social information, while subordinate females were less likely to exploit it successfully. Social bonds and personality also played a limiting role along the sequence. As a result of these constraints, the average individual only acquired and exploited social information on <25% and <5% of occasions. Our study highlights the sequential nature of information use and the fundamental importance of phenotypic constraints on this sequence.
Animals need information to make decisions, and a quick way to get this information is to watch what others are doing. Animals, like humans, have different social networks that they could acquire this kind of ‘social information’ from, yet we know little about which networks they actually use. In addition, once an animal has obtained social information, some aspect of their lives, such as their sex or social rank, could prevent them from using it. Once again, however, we know very little about the impact of these personal constraints.
Carter et al. found that information about the location of a highly preferred food flowed through a social network of wild baboons that was based on who was regularly in close proximity to whom. However, while individuals with more neighbours were better at obtaining social information about food location, they were not better at using it. Rather, individuals were more likely to successfully exploit such information if they were dominant, bold, male, and had good social bonds with others.
Carter et al.’s results show that the use of social information is a process with several stages – from information acquisition, to its application, and finally its exploitation. Furthermore, the characteristics of an individual can limit their success at each of these stages. The next step is to figure out whether different types of social information – whether short- or long-lived, easy to acquire or more complex – flow through the same networks and have the same personal constraints on who can use them.