50 relations: Access control, Accounting, Actor (UML), Anonymous post, Authentication, Authorization, Citizens band radio, Computer, Computer file, Computer network, Computer programming, Computer security, Credential, Discipline, Don Norman, End user, End-user computing, End-user development, End-user license agreement, File Transfer Protocol, Home directory, Identity correlation, Jargon File, Microsoft Windows, Multi-user software, Operating system, Operator (profession), Password, Persona (user experience), Power user, Prosumer, Pseudonym, Registered user, Resource management, Service (systems architecture), Software agent, Software requirements, Stakeholder (corporate), System administrator, Unix, User agent, User error, User experience, User identifier, User interface, User profile, User space, User-centered design, Windows domain, 1% rule (Internet culture).
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.
Accounting or accountancy is the measurement, processing, and communication of financial information about economic entities such as businesses and corporations.
An actor in the Unified Modeling Language (UML) "specifies a role played by a user or any other system that interacts with the subject." "An Actor models a type of role played by an entity that interacts with the subject (e.g., by exchanging signals and data), but which is external to the subject." "Actors may represent roles played by human users, external hardware, or other subjects.
An anonymous post is an entry on a bulletin board system, Internet forum, or other discussion forums, without a screen name or more commonly by using a non-identifiable pseudonym.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
Citizens band radio (also known as CB radio) is, in many countries, a system of short-distance radio communications between individuals typically on a selection of 40 channels within the 27 MHz (11 m) band.
A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.
A computer file is a computer resource for recording data discretely in a computer storage device.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
Computer programming is the process of building and designing an executable computer program for accomplishing a specific computing task.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.
Discipline is action or inaction that is regulated to be in accordance (or to achieve accord) with a system of governance.
Donald Arthur Norman (born December 25, 1935) is the director of The Design Lab at University of California, San Diego.
In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product.
End-user computing (EUC) refers to systems in which non-programmers can create working applications.
End-user development (EUD) or end-user programming (EUP) refers to activities and tools that allow end-users – people who are not professional software developers – to program computers.
In proprietary software, an end-user license agreement (EULA) or software license agreement is the contract between the licensor and purchaser, establishing the purchaser's right to use the software.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.
A home directory is a file system directory on a multi-user operating system containing files for a given user of the system.
In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can permanently link ownership of those user account login IDs to particular individuals by assigning a unique identifier (also called primary or common keys) to all validated account login IDs.
The Jargon File is a glossary and usage dictionary of slang used by computer programmers.
Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
Multi-user software is software that allows access by multiple users of a computer.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
An operator is a professional designation used in various industries, including broadcasting (in television and radio), computing, power generation and transmission, customer service, physics, and construction.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
A persona, (also user persona, customer persona, buyer persona) in user-centered design and marketing is a fictional character created to represent a user type that might use a site, brand, or product in a similar way.
A power user or an experienced user is a computer user who uses advanced features of computer hardware, operating systems, programs, or web sites which are not used by the average user.
A prosumer is a person who consumes and produces a product.
A pseudonym or alias is a name that a person or group assumes for a particular purpose, which can differ from their first or true name (orthonym).
A registered user is a user of a website, program, or other system who has previously registered. Registered users normally provide some sort of credentials (such as a username or e-mail address, and a password) to the system in order to prove their identity: this is known as logging in.
In organizational studies, resource management is the efficient and effective development of an organization's resources when they are needed.
In the contexts of software architecture, service-orientation and service-oriented architecture, the term service refers to a software functionality or a set of software functionalities (such as the retrieval of specified information or the execution of a set of operations) with a purpose that different clients can reuse for different purposes, together with the policies that should control its usage (based on the identity of the client requesting the service, for example).
In computer science, a software agent is a computer program that acts for a user or other program in a relationship of agency, which derives from the Latin agere (to do): an agreement to act on one's behalf.
Software requirements is a field within software engineering that deals with establishing the needs of stakeholders that are to be solved by software.
In a corporation, as defined in its first usage in a 1963 internal memorandum at the Stanford Research Institute, a stakeholder is a member of the "groups without whose support the organization would cease to exist".
A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
In computing, a user agent is software (a software agent) that is acting on behalf of a user.
A user error is an error made by the human user of a complex system, usually a computer system, in interacting with it.
User Experience (UX) refers to a person's emotions and attitudes about using a particular product, system or service.
Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID.
The user interface (UI), in the industrial design field of human–computer interaction, is the space where interactions between humans and machines occur.
A user profile is a visual display of personal data associated with a specific user, or a customized desktop environment.
A modern computer operating system usually segregates virtual memory into kernel space and user space.
User-centered design (UCD) or user-driven development (UDD) is a framework of processes (not restricted to interfaces or technologies) in which usability goals, user characteristics, environment, tasks and workflow of a product, service or process are given extensive attention at each stage of the design process.
A Windows domain is a form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database located on one or more clusters of central computers known as domain controllers.
In Internet culture, the 1% rule is a rule of thumb pertaining to participation in an internet community, stating that only 1% of the users of a website actively create new content, while the other 99% of the participants only lurk.
AOL screen names, Account (computing), Aol screen names, Changing Username, Changing username, Computer login, Computer logon, Computer user, Computer users, End user (computer science), End user (computing), End user of a computer system, End-user (computer science), End-user (computing), End-user of a computer system, In-game name, Internet pseudonym, Login name, My account, Normal user, Screen name (computing), Screenames, Screenname, Software users, Switching user names, Switching usernames, User Account, User Accounts, User Name, User account, User accounts, User area, User name, User name policy, User names, User preferences, User-Name, User-name, UserName, Username, Usernames.