A method employing a software application for operation for analyzing
conversational patterns between people and teams within an organization,
locating inconsistencies in the required and actual access level to
knowledge repositories, which ultimately results in dynamically updating
access control lists of the knowledge repositories, and having the
originator and anticipated users being prompted to further enable
informed, fact-based manual control of the access control lists.