Under these conditions, what Lyon (2008) has referred to as function creep
[[rho].sub.d] [[phi].sub.0] [DELTA][phi] Dam fill (g/[cm.sup.3]) ([degrees]) ([degrees]) Main rockfill 2.30 52 8.5 Secondary rockfill 2.10 50 8.4 Dam fill k n [R.sub.f] [k.sub.b] [m.sub.1] Main rockfill 1100 0.35 0.81 600 0.1 Secondary rockfill 850 0.25 0.84 400 0.05 Table 2: Parameters of the power function creep
curve model of the Shuibuya CFRD materials .
McCahill (2007:15) sees post-9/11 function creep
in "new surveillance technologies" such as data sharing among European Union member states, wiretapping the phone calls of citizens, and using Unmanned Aerial Vehicles (UAVs) to produce aerial surveillance of particular spaces.
Encryption would limit who could read the identifier, thus limiting the risks of function creep
Mr Blunkett guaranteed there would be proper safeguards against function creep
The privacy advocacy group has a term for this: "It's what we call function creep
. At first a device is used for applications we all agree are good but then it slowly is used for more than it was intended."
However, the same report points out there are concerns over "function creep
" - where information collected for one purpose is used more widely, "with the individual losing control over their personal information".