2010
DOI: 10.1080/10807031003788881
|View full text |Cite
|
Sign up to set email alerts
|

Groundwater Vulnerability Assessment of Plant Protection Products: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(36 citation statements)
references
References 72 publications
0
17
0
Order By: Relevance
“…Sound nonpoint source management and control policy requires thorough scientific understanding of nonpoint sources and of the linkage between nonpoint sources and groundwater discharges to users or affected ecosystems via wells, springs, or inflow to streams. Significant scientific effort has been dedicated to understand, manage, and monitor potential sources, to understand the dynamics of NPS pollutants in the vadose zone and in groundwater, and to assess the environmental and public health consequences of NPS pollution of groundwater [ Addiscott and Wagenet , 1985; Corwin et al , 1999; Pavlis et. al.…”
Section: Developing a Rationale For A Nps Groundwater Modeling Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Sound nonpoint source management and control policy requires thorough scientific understanding of nonpoint sources and of the linkage between nonpoint sources and groundwater discharges to users or affected ecosystems via wells, springs, or inflow to streams. Significant scientific effort has been dedicated to understand, manage, and monitor potential sources, to understand the dynamics of NPS pollutants in the vadose zone and in groundwater, and to assess the environmental and public health consequences of NPS pollution of groundwater [ Addiscott and Wagenet , 1985; Corwin et al , 1999; Pavlis et. al.…”
Section: Developing a Rationale For A Nps Groundwater Modeling Frameworkmentioning
confidence: 99%
“…Groundwater nonpoint source assessment tools can be generally grouped into three categories: overlay and index methods to map qualitative indicators of groundwater vulnerability to pollution [ Aller et al , 1987; National Research Council , 1993; Civita and De Maio , 2004; Pavlis et al , 2010], statistical models that estimate potential pollution from existing data sets, e.g., using regression analysis [ Nolan et al , 2002; Worrall et al , 2000] or fuzzy logic [ Uricchio et al , 2004], and last,process‐based methods that simulate contaminant transport using mathematical formulas. The majority of these latter models are limited to the simulation of pollutants in the vadose zone; while simple methods such as zero‐order mixing models [ Mercado , 1976; Lee , 2007], one‐dimensional plug‐flow models [ Hansen et al , 1991; Refsgaard et al , 1999; Cho and Mostaghimi , 2009], or the advective travel time method [ Darracq et al , 2010] are used for the estimation of the fate of contaminants in the saturated zone.…”
Section: Developing a Rationale For A Nps Groundwater Modeling Frameworkmentioning
confidence: 99%
“…In addition, it also considers human activities that could enhance the movement of the contaminants to groundwater (for instance agricultural practices such us irrigation, land use) (Aller et al, 1987;Connell and Daele, 2003;Bozzo et al, 2013). In recent years, many approaches have been developed to evaluate both the intrinsic and specific aquifer vulnerability and comprehensive reviews of groundwater vulnerability assessment methods are present in literature (Zhang et al, 1996;Worrall and Besien, 2005;Pavlis et al, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…Whereas pollutant sources contributing to surface run-off losses are often visible, those contributing to groundwater losses are hidden and difficult to measure directly (Schilling & Wolter, 2001). Assessing the groundwater contribution to NPS loads at a watershed scale is typically conducted using basinwide stream sampling during baseflow (BF; e.g., Aquilina et al, 2012;Schilling & Wolter, 2001), groundwater vulnerability indicators (e.g., Aller, Bennett, Lehr, Petty, & Hackett, 1987;Pavlis, Cummins, & McDonnell, 2010), statistical modelling (e.g., Nolan, Hitt, & Ruddy, 2002;Schilling & Zhang, 2004), or watershed models (Almasri & Kaluarachchi, 2007;Hu & Tian, 2007;Kourakos, Klein, Cortis, & Harter, 2012). In all cases, it is important to match the appropriate method to the scale of investigation.…”
Section: Introductionmentioning
confidence: 99%