1992
DOI: 10.1111/j.1747-6593.1992.tb00755.x
|View full text |Cite
|
Sign up to set email alerts
|

Land‐Surface Zoning for Groundwater Protection

Abstract: A procedure for land‐surface zoning, related to the protection of groundwater against both point and diffuse pollution, is described. The procedure is based upon two independent elements: (i) Division of the entire land surface on the basis of the aquifer pollution vulnerability, which relates to protection of groundwater resources; and (ii) A series of special protection areas for individual sources, in which various potentially polluting activities are either prohibited or strictly controlled. The procedure … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0
3

Year Published

1993
1993
2017
2017

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(41 citation statements)
references
References 0 publications
0
38
0
3
Order By: Relevance
“…In the scope of the development of the EPIK approach, the vulnerability term is defined, as following: Intrinsic vulnerability represents the inherent hydrogeological and geological characteristics which determine the sensitivity of groundwater to contamination by human activities. According to Foster and Hirata (1988), Adams and Foster (1992) and Robins and others (1994), aquifer vulnerability is a function of the natural properties of the overlying soil and rock column or unsaturated zone of the aquifer. The risk of groundwater pollution is dependent on both the "natural" vulnerability according to the aquifer properties and to the subsurface contaminant load imposed by human activity.…”
Section: Definition Of Vulnerability Mappingmentioning
confidence: 99%
See 1 more Smart Citation
“…In the scope of the development of the EPIK approach, the vulnerability term is defined, as following: Intrinsic vulnerability represents the inherent hydrogeological and geological characteristics which determine the sensitivity of groundwater to contamination by human activities. According to Foster and Hirata (1988), Adams and Foster (1992) and Robins and others (1994), aquifer vulnerability is a function of the natural properties of the overlying soil and rock column or unsaturated zone of the aquifer. The risk of groundwater pollution is dependent on both the "natural" vulnerability according to the aquifer properties and to the subsurface contaminant load imposed by human activity.…”
Section: Definition Of Vulnerability Mappingmentioning
confidence: 99%
“…The assessment of specific vulnerability requires consideration ot the characteristics of the aquifer relative to the contaminant and the contaminant itself, in addition to intrinsic hydrogeological and geological characteristics.) Even if the intrinsic vulnerability has only a general meaning in a pollution scenario where specific contaminant take place, according to Andersen and Gosk (1987) and Adams and Foster (1992), the concept of intrinsic vulnerability is necessary to provide a maximum of unbiased information, in order to define protection zones in karst environment. The degradation process are not taken into account in an intrinsic vulnerability approach.…”
Section: Definition Of Vulnerability Mappingmentioning
confidence: 99%
“…The concept of groundwater vulnerability mapping has been extensively used for different types of aquifers using various evaluation criteria (Vrba and Zaporozec 1994). Parameters taken into account may include: soil thickness and hydraulic conductivity, aquifer type and hydraulic conductivity, depth to groundwater level and net recharge, among others (Aller et al 1987;Adams and Foster 1992). These maps were initially useful in providing a decision tool for land use planning and community information (NRC 1993).…”
Section: Spring Vulnerability Versus Vulnerability Mappingmentioning
confidence: 99%
“…The PI Method is based on an origin-pathway-target model: The origin of the assumed hazard is the ground surface; the groundwater table in the uppermost aquifer is the target; the pathway includes the layers between the ground surface and the groundwater surface [13]. Thus, the PI method can be used for resource vulnerability mapping.…”
Section: Groundwater Vulnerabilitymentioning
confidence: 99%