Use of computer models of flood inundation to facilitate communication in flood risk management

Gareth Pender, Sylvian Neelz

    Research output: Contribution to journalArticle

    39 Citations (Scopus)

    Abstract

    It is now widely recognised that good communication between multi-disciplinary stakeholders is central to effective flood risk management. Recent developments in Geographical Information Systems, increased availability of accurate digital terrain models from remotely sensed data sources and improved graphical computer interfaces have made the outputs from computer models of flood inundation easily accessible to the stakeholder community. As a consequence, predictions from such models are now being used routinely as a means of communication between engineers and other stakeholders in flood risk management. This paper provides a review of the modelling methods most appropriate for flood risk communication. These are one-dimensional models which are suitable for simulating flood risk at a catchment or sub-catchment scale and appropriate for communicating the impact of strategic flood management decisions and two-dimensional models which can be applied across a range of scales but, are now being regularly applied at the relatively small scale, less than 10 km2, where they have the potential to inform and communicate disaster management decisions. The role of such models in communicating between modellers and non-modellers by providing a means for immediate visualisation of "the future" is discussed and illustrated by application to two case studies. © 2007 Elsevier Ltd. All rights reserved.

    Original languageEnglish
    Pages (from-to)106-114
    Number of pages9
    JournalEnvironmental Hazards
    Volume7
    Issue number2
    DOIs
    Publication statusPublished - 2007

    Keywords

    • Computer modeling
    • Flood risk communication

    Fingerprint Dive into the research topics of 'Use of computer models of flood inundation to facilitate communication in flood risk management'. Together they form a unique fingerprint.

    Cite this