75:
44:
252:
are created to represent the types of users. It is sometimes specified for each persona which types of user interfaces it is comfortable with (due to previous experience or the interface's inherent simplicity), and what technical expertise and degree of knowledge it has in specific fields or
264:
discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.
636:
Ko, Andrew J.; Abraham, Robin; Beckwith, Laura; Blackwell, Alan; Burnett, Margaret; Erwig, Martin; Scaffidi, Chris; Lawrance, Joseph; Lieberman, Henry; Myers, Brad; Rosson, Mary Beth; Rothermel, Gregg; Shaw, Mary; Wiedenbeck, Susan (April 2011).
257:. When few constraints are imposed on the end-user category, especially when designing programs for use by the general public, it is common practice to expect minimal technical expertise or previous training in end users.
372:, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the
379:
While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for
907:
323:
Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as
296:
resources provided by or connected to that system; however, authentication does not imply authorization. To log into an account, a user is typically required to
229:. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users. In
669:
455:
stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."
710:
937:
458:
The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work.
515:, a technique that allows people who are not professional developers to perform programming tasks, i.e. to create or modify software.
899:
418:, user passwords can be managed within the Credential Manager program. The passwords are located in the Windows profile directory.
438:
80:
686:
828:
79:
795:
767:
638:
376:
to determine which users are granted access to read or execute a file, or to store a new file in that directory.
964:
249:
183:
97:
81:
217:) of a software product. The end user stands in contrast to users who support or maintain the product such as
451:
Some usability professionals have expressed their dislike of the term "user" and have proposed changing it.
969:
158:
364:
pertaining exclusively to that user's activities, which is protected from access by other users (though a
480:
35:
518:
708:
User-Centered Design: A Case Study on Its
Application to the Tactical Tomahawk Weapons Control System.
233:, it also distinguishes the software operator from the client who pays for its development and other
17:
245:, and refers to a relevant subset of characteristics that most expected users would have in common.
426:
Various computer operating-systems and applications expect/enforce different rules for the format.
78:
852:
234:
781:
707:
222:
352:
systems have such a concept, and require users to identify themselves before using the system.
929:
525:), a contract between a supplier of software and its purchaser, granting the right to use it.
467:
238:
214:
512:
463:
365:
324:
261:
230:
8:
612:
317:
226:
661:
500:
408:
31:
974:
506:
430:
415:
313:
127:
107:
753:
342:
Computer systems operate in one of two types based on what kind of users they have:
665:
653:
373:
180:
151:
122:
66:
48:
714:
558:
543:
332:
731:
812:
485:
357:
293:
285:
273:
242:
198:). Some software products provide services to other systems and have no direct
842:
462:
use advanced features of programs, though they are not necessarily capable of
958:
538:
397:
380:
361:
289:
117:
56:
657:
403:
369:
297:
132:
878:
829:"Words Matter. Talk About People: Not Customers, Not Consumers, Not Users"
873:
305:
269:
144:
112:
563:
553:
548:
459:
452:
349:
309:
254:
495:
102:
30:"Username" redirects here. Within Knowledge, "Username" may refer to
503:, systems in which non-programmers can create working applications.
490:
346:
Single-user systems do not have a concept of several user accounts.
301:
210:
199:
176:
847:
533:
52:
768:"[Solved] Where Are Passwords Stored in Windows 10/11"
687:"Understanding Organizational Stakeholders for Design Success"
237:
who may not directly use the software, but help establish its
43:
782:"Password Storage Locations For Popular Windows Applications"
528:
218:
442:
Down-Level Logon Name format – for example: DOMAIN\UserName
392:
328:
635:
509:, a collection of data developed by individual end-users.
356:
Each user account on a multi-user system typically has a
241:. This abstraction is primarily useful in designing the
639:"The State of the Art in End-User Software Engineering"
368:
may have access). User accounts often contain a public
811:
The down-level logon name format is used to specify a
433:
environments, for example, note the potential use of:
34:. For information on altering your own username, see
395:
systems, local user accounts are stored in the file
213:are the ultimate human users (also referred to as
835:
956:
437:User Principal Name (UPN) format – for example:
930:"Windows Confidential: Power to the Power User"
77:
383:and the username "guest" for a guest account.
706:Rigsbee, Sarah, and William B. Fitzpatrick. "
152:
55:, a user is often represented by an abstract
27:Person who uses a computer or network service
843:"Don Norman at UX Week 2008 © Adaptive Path"
754:"What is /etc/passwd and /etc/shadow files"
331:systems, the username is correlated with a
826:
159:
145:
401:, while user passwords may be stored at
42:
288:to a system and potentially to receive
14:
957:
611:, which is derived from the identical
190:and is identified to the system by a
927:
815:and a user account in that domain .
802:. Developer technologies. Microsoft
386:
24:
867:
719:Johns Hopkins APL Technical Digest
675:from the original on 1 April 2011.
421:
284:A user's account allows a user to
73:
25:
986:
910:from the original on Jun 27, 2015
583:Other terms for username include
940:from the original on Apr 4, 2015
921:
892:
855:from the original on 2021-12-21
827:Don Norman (17 November 2008).
820:
279:
788:
774:
760:
746:
724:
700:
679:
629:
577:
446:
13:
1:
622:
7:
473:
205:
175:is a person who utilizes a
36:Knowledge:Changing username
10:
991:
928:Chen, Raymond (Feb 2012).
519:End-user license agreement
481:1% rule (Internet culture)
276:have no direct end users.
29:
248:In user-centered design,
570:
658:10.1145/1922649.1922658
272:is another system or a
223:database administrators
186:. A user often has a
84:
60:
965:Computing terminology
646:ACM Computing Surveys
468:system administration
83:
46:
900:"Power Users' Guide"
513:End-user development
464:computer programming
366:system administrator
360:, in which to store
325:identity correlation
308:for the purposes of
262:end-user development
231:user-centered design
227:computer technicians
970:Identity management
796:"User Name Formats"
732:"What is end user?"
721:31.1 (2012): 76–82.
613:citizens band radio
318:resource management
713:2017-10-14 at the
501:End-user computing
98:Process management
85:
61:
32:Knowledge:Username
851:. February 2010.
507:End-user database
431:Microsoft Windows
416:Microsoft Windows
169:
168:
108:Memory management
67:Operating systems
16:(Redirected from
982:
949:
948:
946:
945:
925:
919:
918:
916:
915:
896:
890:
889:
887:
885:
871:
865:
864:
862:
860:
839:
833:
832:
824:
818:
817:
808:
807:
792:
786:
785:
778:
772:
771:
764:
758:
757:
750:
744:
743:
741:
739:
734:. September 1996
728:
722:
704:
698:
697:
695:
694:
683:
677:
676:
674:
643:
633:
616:
581:
406:
400:
387:Password storage
374:operating system
161:
154:
147:
76:
63:
62:
49:computer program
21:
990:
989:
985:
984:
983:
981:
980:
979:
955:
954:
953:
952:
943:
941:
926:
922:
913:
911:
904:SAP Help Portal
898:
897:
893:
883:
881:
877:
872:
868:
858:
856:
841:
840:
836:
825:
821:
805:
803:
794:
793:
789:
780:
779:
775:
766:
765:
761:
756:. 7 March 2021.
752:
751:
747:
737:
735:
730:
729:
725:
715:Wayback Machine
705:
701:
692:
690:
685:
684:
680:
672:
641:
634:
630:
625:
620:
619:
582:
578:
573:
568:
559:User experience
544:Registered user
476:
449:
424:
422:Username format
402:
396:
389:
333:user identifier
316:, logging, and
300:oneself with a
282:
208:
165:
90:Common features
82:
74:
39:
28:
23:
22:
15:
12:
11:
5:
988:
978:
977:
972:
967:
951:
950:
920:
891:
866:
834:
819:
787:
773:
759:
745:
723:
699:
678:
627:
626:
624:
621:
618:
617:
575:
574:
572:
569:
567:
566:
561:
556:
551:
546:
541:
536:
531:
526:
516:
510:
504:
498:
493:
488:
486:Anonymous post
483:
477:
475:
472:
448:
445:
444:
443:
440:
423:
420:
388:
385:
358:home directory
354:
353:
347:
281:
278:
274:software agent
268:Systems whose
243:user interface
207:
204:
167:
166:
164:
163:
156:
149:
141:
138:
137:
136:
135:
130:
125:
120:
118:Device drivers
115:
110:
105:
100:
92:
91:
87:
86:
70:
69:
26:
9:
6:
4:
3:
2:
987:
976:
973:
971:
968:
966:
963:
962:
960:
939:
935:
931:
924:
909:
905:
901:
895:
880:
875:
870:
854:
850:
849:
844:
838:
830:
823:
816:
814:
801:
797:
791:
783:
777:
769:
763:
755:
749:
733:
727:
720:
716:
712:
709:
703:
688:
682:
671:
667:
663:
659:
655:
651:
647:
640:
632:
628:
614:
610:
606:
602:
598:
594:
590:
586:
580:
576:
565:
562:
560:
557:
555:
552:
550:
547:
545:
542:
540:
537:
535:
532:
530:
527:
524:
520:
517:
514:
511:
508:
505:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
478:
471:
469:
465:
461:
456:
454:
441:
439:
436:
435:
434:
432:
427:
419:
417:
412:
410:
405:
399:
394:
384:
382:
381:anonymous FTP
377:
375:
371:
367:
363:
359:
351:
348:
345:
344:
343:
340:
338:
334:
330:
326:
321:
319:
315:
311:
307:
303:
299:
295:
291:
290:authorization
287:
277:
275:
271:
266:
263:
258:
256:
251:
246:
244:
240:
236:
232:
228:
224:
220:
216:
212:
203:
201:
197:
193:
189:
185:
182:
178:
174:
162:
157:
155:
150:
148:
143:
142:
140:
139:
134:
131:
129:
126:
124:
121:
119:
116:
114:
111:
109:
106:
104:
101:
99:
96:
95:
94:
93:
89:
88:
72:
71:
68:
65:
64:
58:
54:
50:
45:
41:
37:
33:
19:
942:. Retrieved
933:
923:
912:. Retrieved
903:
894:
882:. Retrieved
869:
857:. Retrieved
846:
837:
822:
810:
804:. Retrieved
799:
790:
776:
762:
748:
736:. Retrieved
726:
718:
702:
691:. Retrieved
689:. 2004-05-06
681:
649:
645:
631:
608:
604:
600:
597:account name
596:
592:
588:
584:
579:
522:
457:
450:
428:
425:
413:
390:
378:
370:user profile
355:
341:
336:
322:
298:authenticate
286:authenticate
283:
280:User account
267:
259:
247:
239:requirements
235:stakeholders
209:
195:
191:
188:user account
187:
172:
170:
133:Input/output
59:of a person.
40:
884:November 7,
874:Jargon File
738:November 7,
652:(3): 1–44.
593:screen name
460:Power users
447:Terminology
404:/etc/shadow
398:/etc/passwd
306:credentials
255:disciplines
113:File system
959:Categories
944:2015-01-14
914:2015-01-14
876:entry for
859:8 November
806:2016-01-11
693:2016-08-31
623:References
589:screenname
585:login name
564:User space
554:User agent
549:User error
453:Don Norman
350:Multi-user
310:accounting
123:Networking
103:Interrupts
934:Microsoft
496:Pseudonym
304:or other
215:operators
211:End users
200:end users
196:user name
47:Within a
18:User name
975:Consumer
938:Archived
908:Archived
853:Archived
711:Archived
670:Archived
601:nickname
539:Nickname
491:Prosumer
474:See also
314:security
302:password
250:personas
206:End user
192:username
177:computer
128:Security
848:YouTube
666:9435548
534:Namechk
407:in its
337:user ID
184:service
181:network
53:website
879:"User"
813:domain
664:
609:handle
607:) and
411:form.
409:hashed
294:access
219:sysops
673:(PDF)
662:S2CID
642:(PDF)
615:term.
571:Notes
529:Luser
362:files
327:. In
270:actor
886:2010
861:2010
800:MSDN
740:2010
605:nick
603:(or
591:(or
523:EULA
466:and
393:Unix
329:Unix
260:The
225:and
194:(or
173:user
57:icon
654:doi
595:),
429:In
414:On
391:On
335:or
292:to
179:or
51:or
961::
936:.
932:.
906:.
902:.
845:.
809:.
798:.
668:.
660:.
650:43
648:.
644:.
599:,
587:,
470:.
339:.
320:.
312:,
221:,
202:.
171:A
947:.
917:.
888:.
863:.
831:.
784:.
770:.
742:.
717:"
696:.
656::
521:(
160:e
153:t
146:v
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.