LEADER 08267nam 2200685 a 450 001 9910961926403321 005 20251116140458.0 010 $a9786610196302 010 $a9781280196300 010 $a1280196300 010 $a9780309585088 010 $a0309585082 010 $a9780585028675 010 $a0585028672 035 $a(CKB)110986584751236 035 $a(OCoLC)42329395 035 $a(CaPaEBR)ebrary10055620 035 $a(SSID)ssj0000165840 035 $a(PQKBManifestationID)11153114 035 $a(PQKBTitleCode)TC0000165840 035 $a(PQKBWorkID)10147033 035 $a(PQKB)11145674 035 $a(MiAaPQ)EBC3376406 035 $a(Au-PeEL)EBL3376406 035 $a(CaPaEBR)ebr10055620 035 $a(OCoLC)923263578 035 $a(Perlego)4736109 035 $a(BIP)670085 035 $a(EXLCZ)99110986584751236 100 $a19930818d1993 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aGround water vulnerability assessment $econtamination potential under conditions of uncertainty /$fCommittee on Techniques for Assessing Ground Water Vulnerability, Water Science and Technology Board, Commission on Geosciences, Environment, and Resources, National Research Council 205 $a1st ed. 210 $aWashington, D.C. $cNational Academy Press$d1993 215 $a1 online resource (226 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780309047999 311 08$a0309047994 320 $aIncludes bibliographical references and index. 327 $aGROUND WATER VULNERABILITY ASSESSMENT -- Copyright -- Preface -- Contents -- Executive Summary -- INTRODUCTION -- The Vulnerability Assessment Process -- MANAGEMENT -- APPROACHES TO VULNERABILITY ASSESSMENT -- Uncertainty in Vulnerability Assessment -- Testing and Evaluation of Vulnerability Assessments -- Computing Environments for Vulnerability Assessments -- DATA AND DATABASES -- CASE STUDIES -- RESEARCH RECOMMENDATIONS -- REFERENCE -- 1 Introduction -- PROTECTING GROUND WATER FROM FUTURE CONTAMINATION -- Ground Water Vulnerability to Contamination -- ASSESSING GROUND WATER VULNERABILITY -- Uncertainty in the Assessment Process -- Elements of Vulnerability Assessment -- Reference Location -- Specific and Intrinsic Vulnerability -- Contaminant Pathways -- Spatial Scales -- THE VULNERABILITY ASSESSMENT PROCESS -- Case Studies -- REFERENCES -- 2 Considerations in the Selection and Use of Vulnerability Assessments -- INTRODUCTION -- EXISTING AND POTENTIAL USES FOR VULNERABILITY ASSESSMENTS -- Policy Analysis and Development -- Program Management -- Land Use Decisions -- Zoning and Screening -- Conditioning, Mitigating, and Compliance Monitoring -- Technical Assistance -- General Education and Awareness -- FACTORS AFFECTING SELECTION AND USE OF VULNERABILITY ASSESSMENTS -- Technical Considerations -- Type and Form of Output -- Size and Characteristics of Assessment Area -- Availability of Data -- Uncertainty of Results and Impact on Use -- Institutional Considerations -- Time Frame of a Vulnerability Assessment -- Cost and Commitment of Personnel and Physical Resources -- Coordination with Other Planning Programs and Needs -- Coordination with Other Agencies and Institutions -- SUMMARY -- 3 Approaches to Vulnerability Assessments -- INTRODUCTION -- REVIEW OF CURRENT APPROACHES -- Overlay and Index Methods -- Depth to Ground Water -- Recharge. 327 $aProperties of the Unsaturated Zone and Aquifer Material -- Discussion -- Process-Based Simulation Models -- Discussion -- Statistical Techniques for Vulnerability Assessment -- Regionalization -- Vulnerability Assessment -- UNCERTAINTY IN VULNERABILITY ASSESSMENT METHODS -- Sources of Errors -- Errors in Obtaining Data -- Errors Due to Natural Spatial and Temporal Variability -- Errors in Computerization (Digitizing) and Storage of Data -- Data Processing Errors -- Models and Conceptualizations -- Output and Visualization Errors -- Uncertainty Analyses -- Applications of FOUA to Vulnerability Assessment -- Uncertainty of Uncertainty Analyses -- TESTING AND EVALUATION OF VULNERABILITY ASSESSMENTS -- Regional-Scale Testing and Evaluation -- Limitations of Ground Water Quality Sampling -- Difficulties in Characterizing the Mobile Fraction of Contaminants -- Sampling Near the Water Table -- Purging and Pumping -- COMPUTING ENVIRONMENTS FOR VULNERABILITY ASSESSMENTS -- Building and Making Databases Available for Assessment Approaches -- Geographical Display of Assessment Results -- Analytical Functions -- SUMMARY -- REFERENCES -- 4 Data and Databases -- INTRODUCTION -- Federal Data Management Activities -- State and Local Data Management Activities -- TOPOGRAPHY -- Characteristics and Availability of Data -- Discussion -- SOILS -- Characteristics and Availability of Data -- Geographic Databases -- Attribute Databases -- Site-Specific Databases -- Discussion -- HYDROGEOLOGY -- Characteristics and Availability of Data -- Discussion -- WEATHER AND CLIMATE -- Characteristics and Availability of Data -- Discussion -- LAND USE AND LAND COVER -- Characteristics and Availability of Data -- Discussion -- MANAGEMENT FACTORS -- Characteristics and Availability of Data -- National Resources Inventory -- Agricultural Census of 1987 -- Farm and Ranch Irrigation Survey. 327 $aPesticide Databases -- Field Level Databases -- CONCLUSION -- REFERENCES -- 5 Case Studies -- INTRODUCTION -- IOWA -- Introduction -- Defining the Question -- Mandate, Selection, and Implementation -- CAPE COD -- Introduction -- Defining the Question -- Selection and Implementation of Approaches -- Results -- FLORIDA -- Introduction -- The Hydrogeologic Setting -- Defining the Question -- Selecting an Approach -- Results -- THE SAN JOAQUIN VALLEY -- Introduction -- Hydrogeologic Setting -- Defining the Question -- Selection and Implementation of an Approach -- HAWAII -- Introduction -- Defining the Question -- Approaches -- Results -- APPLICATION OF A VULNERABILITY INDEX FOR DECISION-MAKING AT THE NATIONAL LEVEL -- Need for a Vulnerability Index -- Description of the Vulnerability Index -- Application to Program Management -- Application to Policy Analysis and Development -- SUMMARY -- REFERENCES -- 6 Conclusions and Recommendations -- MANAGEMENT IMPLICATIONS -- APPROACHES -- DATA AND DATABASES -- RESEARCH AGENDA -- Fundamental Transport and Fate Processes -- Databases -- Geoprocessing and Display -- Assessment Methods -- Appendixes -- Appendix A Sources for Digital Resource Databases -- GENERAL SOURCE INFORMATION -- Appendix B Biographical Sketches -- COMMITTEE MEMBERS -- COMMITTEE STAFF -- Appendix C Contributors to the Committee's Effort -- Index. 330 $aSince the need to protect ground water from pollution was recognized, researchers have made progress in understanding the vulnerability of ground water to contamination. Yet, there are substantial uncertainties in the vulnerability assessment methods now available. With a wealth of detailed information and practical advice, this volume will help decisionmakers derive the most benefit from available assessment techniques. It offers Three laws of ground water vulnerability. Six case studies of vulnerability assessment. Guidance for selecting vulnerability assessments and using the results. Reviews of the strengths and limitations of assessment methods. Information on available data bases, primarily at the federal level. This book will be indispensable to policymakers and resource managers, environmental professionals, researchers, faculty, and students involved in ground water issues, as well as investigators developing new assessment methods. 606 $aGroundwater$xPollution 606 $aWater$xPollution potential 615 0$aGroundwater$xPollution. 615 0$aWater$xPollution potential. 676 $a628.1/68 712 02$aNational Research Council (U.S.).$bCommittee on Techniques for Assessing Ground Water Vulnerability. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910961926403321 996 $aGround water vulnerability assessment$94359118 997 $aUNINA