Skip to main content

Currently Skimming:

Executive Summary
Pages 1-12

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... As considered herein, ground water vulnerability refers to contamination resulting from nonpoint sources or areally distributed point sources of pollution and does not address individual point sources of pollution nor any situation where a pollutant is purposely placed into the ground water system. This definition of ground water vulnerability is flawed, as is any
From page 2...
... In this sense, a ground water vulnerability assessment is a predictive statement much like a weather forecast, but for processes that take place underground and over much longer time scales. The potential for contaminants to leach to ground water depends on many factors, including the composition of soils and geologic materials in the unsaturated zone, the depth to the water table, the recharge rate, and environmental factors influencing the potential for biodegradation.
From page 3...
... Inherent in any such combination will be scientific uncertainties associated with errors in data, errors in method, and potential misapplication of an approach to a given area. The prediction of ground water vulnerability is an imprecise exercise, as stated in the Second Law of Ground Water Vulnerability: Uncertainty is inherent in all vulnerability assessments.
From page 4...
... First, assessments can be used in the policy analysis and development process to identify potential for ground water contamination and the need for protection and to aid in examining the relative impacts of alternative ways to control contamination. Second, when scarce resources prevent uniform and high levels of spending, vulnerability assessments can be used in program management to guide allocation and targeting of resources to areas where the greatest levels of effort are warranted.
From page 5...
... APPROACHES TO VULNERABILITY ASSESSMENT The three classes of methods for assessing ground water vulnerability range in complexity from a subjective evaluation of available map data to the application of complex transport models. Each class has characteristic strengths and weaknesses that affect its suitability for particular applications.
From page 6...
... While process-based models attempt to incorporate a more complete description of the physical, chemical, and biological processes affecting ground water vulnerability, they may not necessarily provide more reliable results. The data these methods require often are not available and must be estimated by indirect means.
From page 7...
... It is not possible to test regional vulnerability assessments on even a field-scale in the same way that a site-specific simulation model can be tested, nor is it possible to make definitive statements about the predictive accuracy of one method compared to another. One difficulty is that a vulnerability assessment method may yield an index value or a probability, which, unlike a concentration, cannot be measured in the field.
From page 8...
... Computing Environments for Vulnerability Assessments Regardless of method, much data on attributes and geography are required to conduct a ground water vulnerability assessment. In addition, suitable analytical tools are required to prepare, combine, study, and display the various components of the assessment.
From page 9...
... Accelerated efforts to improve and develop spatial and attribute databases will facilitate the improvement of ground water vulnerability assessment methods. CASE STUDIES An array of methods for assessing ground water vulnerability is being used around the country.
From page 10...
... Develop ways to determine the additional uncertainty arising from the use of transfer functions in ground water vulnerability assessments.
From page 11...
... · Establish more meaningful categories of vulnerability for assessment methods. Determine which processes are most important to incorporate into vulnerability assessments at different spatial scales.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.