Security classification applying social norming
First Claim
1. A method for content management, said method including:
- receiving content from a user;
storing the received content in a data repository;
identifying an attempt to access the content from a non-user;
determining whether the content includes a security classification;
sending an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content;
generating a list of users, the list of users only including users that have sent content to be stored in the data repository and have not assigned a security classification to the content to be stored in the data repository, wherein the list of users excludes users that have sent content to be stored in the data repository and have assigned a security classification to the content to be stored in the data repository; and
sending the list to at least one of the users'"'"' peers, the users'"'"' supervisors, and the users.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an interface; and, a data repository connected to the interface stores the content. A portal connected to the data repository identifies an attempt to access the content from a non-user. A program processor connected to the portal determines whether the content includes a security classification. When the content does not include a security classification, a communications module connected to the program processor sends an alert to the user. The alert includes a request to assign a security classification to the content. When the content includes a security classification, the communications module sends a message to the user, wherein the message includes a request to verify the security classification.
-
Citations
23 Claims
-
1. A method for content management, said method including:
-
receiving content from a user; storing the received content in a data repository; identifying an attempt to access the content from a non-user; determining whether the content includes a security classification; sending an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content; generating a list of users, the list of users only including users that have sent content to be stored in the data repository and have not assigned a security classification to the content to be stored in the data repository, wherein the list of users excludes users that have sent content to be stored in the data repository and have assigned a security classification to the content to be stored in the data repository; and sending the list to at least one of the users'"'"' peers, the users'"'"' supervisors, and the users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for content management, said method including:
-
receiving content from a user; storing the received content in a data repository; identifying an attempt to access the content from a non-user; determining whether the content includes a security classification; defining at least one select non-user; sending an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content, wherein the alert is only sent to the user when the attempt to access the content is made by the select non-user; and sending a message to the user when the content includes a security classification, the message including a request to verify the security classification. - View Dependent Claims (12)
-
-
13. A system for content management, said system including:
-
an interface for receiving content from a user; a data repository connected to said interface for storing the received content; a portal connected to said data repository, said portal identifies an attempt to access the content by a non-user; a program processor connected to said portal, said program processor determines whether the content includes a security classification; and a communications module connected to said program processor, said communications module sends an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content, the alert notifying the user that others cannot access the content until a security classification is assigned to the content, said communications module only sends the alert to the user when the attempt to access the content is made by a select non-user. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product for content management, said computer program product including:
-
a non-transitory computer readable storage medium; first program instructions to receive content from a user; second program instructions to store the received content in a data repository; third program instructions to identify an attempt to access the content from a non-user; fourth program instructions to determine whether the content includes a security classification; fifth program instructions to send an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content, the alert notifying the user; that others cannot access the content until a security classification is assigned to the content, and that a non-user has attempted to access the content; sixth program instructions to generating a list of users that have sent content to be stored in the data repository and have not assigned a security classification to the content to be stored in the data repository; and seventh program instructions to send the list to the users'"'"' peers, the users'"'"' supervisors, and the users, said first program instructions, said second program instructions, said third program instructions, said fourth program instructions, said fifth program instructions, said sixth program instructions, and said seventh program instructions are stored on said computer readable storage medium.
-
Specification