An identification key is a tool to assist a user identify an organism. It guides the user along a path towards an identification.
There are three main types of keys:
A random access key provides a list of the distinguishing features of the organisms in the key (in the case of crabs, this would be a set of the important features of different types of crabs). These features can be accessed in a random order and the keys are are usually computer-based, as a database is generally required to hold the key’s data.
An identification is performed by selecting from among the listed features those that match your specimen; essentially, you describe the features of your specimen to the key. The tool then compares your described features against a database of the features of all the organisms in the key, and returns a list of those organisms that match your choices. As you choose answers to the questions asked by the key, the list of potential matches is progressively reduced.
For example, you may tell the key that your crab is brown, has a body covered in hairs and has claws that are more or less the same size. The key will list all brown, hairy, equal-clawed crabs. If only one crab matches this description, you will have completed the identification. Otherwise, there may be several crabs that match. Selecting further features may then help narrow the choice.
Random access keys available on the web include:
A pathway key asks specific questions about an organism in a specified order. The first question may be whether the claws of your crab are more or less the same size or are very unequal. Choosing ‘more or less the same size’ will lead to a second question, the answer to which will lead to a third, and so on. By answering questions in the order specified, the key will lead you along a pathway of successive questions. At the end of the path hopefully will be the name of your crab.
Pathway keys can be readily printed and are often, though not exclusively, found in books.
Examples of pathway keys are:
A hybrid key contains features of both random access and pathway keys. For example:
The different types of keys are converging into a more flexible information environment. The ALA-supported IdentifyLifeis playing an important role in this process.
Random access keys have the following strengths:
Pathway keys have the following strengths:
Random access keys have the following weaknesses:
Pathway keys have the following weaknesses: