75:
44:
252:
are created to represent the types of users. It is sometimes specified for each persona which types of user interfaces it is comfortable with (due to previous experience or the interface's inherent simplicity), and what technical expertise and degree of knowledge it has in specific fields or
264:
discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.
634:
Ko, Andrew J.; Abraham, Robin; Beckwith, Laura; Blackwell, Alan; Burnett, Margaret; Erwig, Martin; Scaffidi, Chris; Lawrance, Joseph; Lieberman, Henry; Myers, Brad; Rosson, Mary Beth; Rothermel, Gregg; Shaw, Mary; Wiedenbeck, Susan (April 2011).
257:. When few constraints are imposed on the end-user category, especially when designing programs for use by the general public, it is common practice to expect minimal technical expertise or previous training in end users.
372:, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the
379:
While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for
905:
323:
Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as
296:
resources provided by or connected to that system; however, authentication does not imply authorization. To log into an account, a user is typically required to
229:. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users. In
667:
453:
stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."
708:
935:
456:
The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work.
513:, a technique that allows people who are not professional developers to perform programming tasks, i.e. to create or modify software.
897:
418:, user passwords can be managed within the Credential Manager program. The passwords are located in the Windows profile directory.
80:
684:
826:
79:
793:
765:
636:
376:
to determine which users are granted access to read or execute a file, or to store a new file in that directory.
962:
249:
183:
97:
81:
217:) of a software product. The end user stands in contrast to users who support or maintain the product such as
449:
Some usability professionals have expressed their dislike of the term "user" and have proposed changing it.
967:
158:
364:
pertaining exclusively to that user's activities, which is protected from access by other users (though a
478:
35:
516:
706:
User-Centered Design: A Case Study on Its
Application to the Tactical Tomahawk Weapons Control System.
233:, it also distinguishes the software operator from the client who pays for its development and other
17:
245:, and refers to a relevant subset of characteristics that most expected users would have in common.
426:
Various computer operating-systems and applications expect/enforce different rules for the format.
78:
850:
234:
779:
705:
222:
352:
systems have such a concept, and require users to identify themselves before using the system.
927:
523:), a contract between a supplier of software and its purchaser, granting the right to use it.
465:
238:
214:
510:
461:
365:
324:
261:
230:
8:
610:
317:
226:
659:
498:
408:
31:
972:
504:
430:
415:
313:
127:
107:
751:
342:
Computer systems operate in one of two types based on what kind of users they have:
663:
651:
373:
180:
151:
122:
66:
48:
712:
556:
541:
332:
729:
810:
483:
357:
293:
285:
273:
242:
198:). Some software products provide services to other systems and have no direct
840:
460:
use advanced features of programs, though they are not necessarily capable of
956:
536:
397:
380:
361:
289:
117:
56:
655:
403:
369:
297:
132:
876:
827:"Words Matter. Talk About People: Not Customers, Not Consumers, Not Users"
871:
305:
269:
144:
112:
561:
551:
546:
457:
450:
349:
309:
254:
493:
102:
30:"Username" redirects here. Within Knowledge, "Username" may refer to
437:
User
Principal Name (UPN) format – for example: UserName@Example.com
501:, systems in which non-programmers can create working applications.
488:
346:
Single-user systems do not have a concept of several user accounts.
301:
210:
199:
176:
845:
531:
52:
766:"[Solved] Where Are Passwords Stored in Windows 10/11"
685:"Understanding Organizational Stakeholders for Design Success"
237:
who may not directly use the software, but help establish its
43:
780:"Password Storage Locations For Popular Windows Applications"
526:
218:
440:
Down-Level Logon Name format – for example: DOMAIN\UserName
392:
328:
633:
507:, a collection of data developed by individual end-users.
356:
Each user account on a multi-user system typically has a
241:. This abstraction is primarily useful in designing the
637:"The State of the Art in End-User Software Engineering"
368:
may have access). User accounts often contain a public
809:
The down-level logon name format is used to specify a
433:
environments, for example, note the potential use of:
34:. For information on altering your own username, see
395:
systems, local user accounts are stored in the file
213:are the ultimate human users (also referred to as
833:
954:
928:"Windows Confidential: Power to the Power User"
77:
383:and the username "guest" for a guest account.
704:Rigsbee, Sarah, and William B. Fitzpatrick. "
152:
55:, a user is often represented by an abstract
27:Person who uses a computer or network service
841:"Don Norman at UX Week 2008 © Adaptive Path"
752:"What is /etc/passwd and /etc/shadow files"
331:systems, the username is correlated with a
824:
159:
145:
401:, while user passwords may be stored at
42:
288:to a system and potentially to receive
14:
955:
609:, which is derived from the identical
190:and is identified to the system by a
925:
813:and a user account in that domain .
800:. Developer technologies. Microsoft
386:
24:
865:
717:Johns Hopkins APL Technical Digest
673:from the original on 1 April 2011.
421:
284:A user's account allows a user to
73:
25:
984:
908:from the original on Jun 27, 2015
581:Other terms for username include
938:from the original on Apr 4, 2015
919:
890:
853:from the original on 2021-12-21
825:Don Norman (17 November 2008).
818:
279:
786:
772:
758:
744:
722:
698:
677:
627:
575:
444:
13:
1:
620:
7:
471:
205:
175:is a person who utilizes a
36:Knowledge:Changing username
10:
989:
926:Chen, Raymond (Feb 2012).
517:End-user license agreement
479:1% rule (Internet culture)
276:have no direct end users.
29:
248:In user-centered design,
568:
656:10.1145/1922649.1922658
272:is another system or a
223:database administrators
186:. A user often has a
84:
60:
963:Computing terminology
644:ACM Computing Surveys
466:system administration
83:
46:
898:"Power Users' Guide"
511:End-user development
462:computer programming
366:system administrator
360:, in which to store
325:identity correlation
308:for the purposes of
262:end-user development
231:user-centered design
227:computer technicians
968:Identity management
794:"User Name Formats"
730:"What is end user?"
719:31.1 (2012): 76–82.
611:citizens band radio
318:resource management
711:2017-10-14 at the
499:End-user computing
98:Process management
85:
61:
32:Knowledge:Username
849:. February 2010.
505:End-user database
431:Microsoft Windows
416:Microsoft Windows
169:
168:
108:Memory management
67:Operating systems
16:(Redirected from
980:
947:
946:
944:
943:
923:
917:
916:
914:
913:
894:
888:
887:
885:
883:
869:
863:
862:
860:
858:
837:
831:
830:
822:
816:
815:
806:
805:
790:
784:
783:
776:
770:
769:
762:
756:
755:
748:
742:
741:
739:
737:
732:. September 1996
726:
720:
702:
696:
695:
693:
692:
681:
675:
674:
672:
641:
631:
614:
579:
406:
400:
387:Password storage
374:operating system
161:
154:
147:
76:
63:
62:
49:computer program
21:
988:
987:
983:
982:
981:
979:
978:
977:
953:
952:
951:
950:
941:
939:
924:
920:
911:
909:
902:SAP Help Portal
896:
895:
891:
881:
879:
875:
870:
866:
856:
854:
839:
838:
834:
823:
819:
803:
801:
792:
791:
787:
778:
777:
773:
764:
763:
759:
754:. 7 March 2021.
750:
749:
745:
735:
733:
728:
727:
723:
713:Wayback Machine
703:
699:
690:
688:
683:
682:
678:
670:
639:
632:
628:
623:
618:
617:
580:
576:
571:
566:
557:User experience
542:Registered user
474:
447:
424:
422:Username format
402:
396:
389:
333:user identifier
316:, logging, and
300:oneself with a
282:
208:
165:
90:Common features
82:
74:
39:
28:
23:
22:
15:
12:
11:
5:
986:
976:
975:
970:
965:
949:
948:
918:
889:
864:
832:
817:
785:
771:
757:
743:
721:
697:
676:
625:
624:
622:
619:
616:
615:
573:
572:
570:
567:
565:
564:
559:
554:
549:
544:
539:
534:
529:
524:
514:
508:
502:
496:
491:
486:
484:Anonymous post
481:
475:
473:
470:
446:
443:
442:
441:
438:
423:
420:
388:
385:
358:home directory
354:
353:
347:
281:
278:
274:software agent
268:Systems whose
243:user interface
207:
204:
167:
166:
164:
163:
156:
149:
141:
138:
137:
136:
135:
130:
125:
120:
118:Device drivers
115:
110:
105:
100:
92:
91:
87:
86:
70:
69:
26:
9:
6:
4:
3:
2:
985:
974:
971:
969:
966:
964:
961:
960:
958:
937:
933:
929:
922:
907:
903:
899:
893:
878:
873:
868:
852:
848:
847:
842:
836:
828:
821:
814:
812:
799:
795:
789:
781:
775:
767:
761:
753:
747:
731:
725:
718:
714:
710:
707:
701:
686:
680:
669:
665:
661:
657:
653:
649:
645:
638:
630:
626:
612:
608:
604:
600:
596:
592:
588:
584:
578:
574:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
522:
518:
515:
512:
509:
506:
503:
500:
497:
495:
492:
490:
487:
485:
482:
480:
477:
476:
469:
467:
463:
459:
454:
452:
439:
436:
435:
434:
432:
427:
419:
417:
412:
410:
405:
399:
394:
384:
382:
381:anonymous FTP
377:
375:
371:
367:
363:
359:
351:
348:
345:
344:
343:
340:
338:
334:
330:
326:
321:
319:
315:
311:
307:
303:
299:
295:
291:
290:authorization
287:
277:
275:
271:
266:
263:
258:
256:
251:
246:
244:
240:
236:
232:
228:
224:
220:
216:
212:
203:
201:
197:
193:
189:
185:
182:
178:
174:
162:
157:
155:
150:
148:
143:
142:
140:
139:
134:
131:
129:
126:
124:
121:
119:
116:
114:
111:
109:
106:
104:
101:
99:
96:
95:
94:
93:
89:
88:
72:
71:
68:
65:
64:
58:
54:
50:
45:
41:
37:
33:
19:
940:. Retrieved
931:
921:
910:. Retrieved
901:
892:
880:. Retrieved
867:
855:. Retrieved
844:
835:
820:
808:
802:. Retrieved
797:
788:
774:
760:
746:
734:. Retrieved
724:
716:
700:
689:. Retrieved
687:. 2004-05-06
679:
647:
643:
629:
606:
602:
598:
595:account name
594:
590:
586:
582:
577:
520:
455:
448:
428:
425:
413:
390:
378:
370:user profile
355:
341:
336:
322:
298:authenticate
286:authenticate
283:
280:User account
267:
259:
247:
239:requirements
235:stakeholders
209:
195:
191:
188:user account
187:
172:
170:
133:Input/output
59:of a person.
40:
882:November 7,
872:Jargon File
736:November 7,
650:(3): 1–44.
591:screen name
458:Power users
445:Terminology
404:/etc/shadow
398:/etc/passwd
306:credentials
255:disciplines
113:File system
957:Categories
942:2015-01-14
912:2015-01-14
874:entry for
857:8 November
804:2016-01-11
691:2016-08-31
621:References
587:screenname
583:login name
562:User space
552:User agent
547:User error
451:Don Norman
350:Multi-user
310:accounting
123:Networking
103:Interrupts
932:Microsoft
494:Pseudonym
304:or other
215:operators
211:End users
200:end users
196:user name
47:Within a
18:User name
973:Consumer
936:Archived
906:Archived
851:Archived
709:Archived
668:Archived
599:nickname
537:Nickname
489:Prosumer
472:See also
314:security
302:password
250:personas
206:End user
192:username
177:computer
128:Security
846:YouTube
664:9435548
532:Namechk
407:in its
337:user ID
184:service
181:network
53:website
877:"User"
811:domain
662:
607:handle
605:) and
411:form.
409:hashed
294:access
219:sysops
671:(PDF)
660:S2CID
640:(PDF)
613:term.
569:Notes
527:Luser
362:files
327:. In
270:actor
884:2010
859:2010
798:MSDN
738:2010
603:nick
601:(or
589:(or
521:EULA
464:and
393:Unix
329:Unix
260:The
225:and
194:(or
173:user
57:icon
652:doi
593:),
429:In
414:On
391:On
335:or
292:to
179:or
51:or
959::
934:.
930:.
904:.
900:.
843:.
807:.
796:.
666:.
658:.
648:43
646:.
642:.
597:,
585:,
468:.
339:.
320:.
312:,
221:,
202:.
171:A
945:.
915:.
886:.
861:.
829:.
782:.
768:.
740:.
715:"
694:.
654::
519:(
160:e
153:t
146:v
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.