U.S. Regulatory Approaches: A Critical Appraisal

1992 ◽  
Vol 25 (3) ◽  
pp. 13-21
Author(s):  
R. L. Williamson

The American approach to environmental regulation is characterized by fragmentation of responsibilities, primary reliance on command and control regulations, extraordinary complexity, a preference for identifiable standards, and heavy resort to litigation. This system has provided important benefits, including significant reduction of environmental contamination, substantial use of science in decision-making, broad participatory rights, and the stimulation of new treatment technologies. However, these gains have been achieved at excessive cost. Too much reliance is placed on command and control methods and especially on technology-based standards. There is too much resort to litigation, and inadequate input from science. Participatory rights are being undermined, and there is a poor allocation of decision-making among the federal agencies and the states. Over-regulation sometimes leads to under-regulation, and insufficient attention is given to the impact on small entities. The responsibility for these difficulties rests with everyone, including the federal agencies, the Congress, the general public and the courts. Changes in the regulatory system are needed. We should abandon the use of technology-based standards to control toxic substances under the Clean Water Act in favor of strong health- and environmentally based standards, coupled with taxes on toxic substances in wastewater.

2008 ◽  
Author(s):  
Daniel P. Jenkins ◽  
Neville A. Stanton ◽  
Paul M. Salmon ◽  
Guy H. Walker

Author(s):  
H. Golan ◽  
A. Parush ◽  
E. Jaffe

Using a simulated Emergency Medical Services (EMS) dispatch center during multi-casualty incident management, this study explored whether the presence of a separate situation display in a Command and Control (C2) setting might require attention at the expense of attending an individual task display, and how it influenced performance and situational awareness. Overall, participants always attended the task display more than the situation display. However, the situation display drew attention at the expense of attending less the task display. The presence of the situation display was related to improved performance and better situational awareness (SA), particularly in the projection level of the SA, which could account also for the better decision-making performance. Participants may have developed an attention allocation strategy to effectively utilize the information of the situation display and execute their tasks on the task display.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Xiue Gao ◽  
Duoping Zhang ◽  
Keqiu Li ◽  
Bo Chen

Cascading failures in the command and control networks (C2 networks) could substantially affect the network invulnerability to some extent. In particular, without considering the characteristics of hierarchy structure, it is quite misleading to employ the existing cascading failure models and effectively analyze the invulnerability of C2 networks. Therefore, a novel cascading failure model for command and control networks with hierarchy structure is proposed in this paper. Firstly, a method of defining the node’s initial load in C2 networks based on hierarchy-degree is proposed. By applying the method, the impact of organizational positions and the degree of the node on its initial load could be highlighted. Secondly, a nonuniform adjustable load redistribution strategy (NALR strategy) is put forward in this paper. More specifically, adjusting the redistribution coefficient could allocate the load from failure nodes to the higher and the same level neighboring nodes according to different proportions. It could be demonstrated by simulation results that the robustness of C2 networks against cascading failures could be dramatically improved by adjusting the initial load adjustment coefficient, the tolerance parameter, and the load redistribution coefficient. And finally, comparisons with other relational models are provided to verify the rationality and effectiveness of the model proposed in this paper. Subsequently, the invulnerability of C2 networks could be enhanced.


Sign in / Sign up

Export Citation Format

Share Document