User (computing)

Person who uses a computer or network service


title: "User (computing)" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["computing-terminology", "identity-management", "consumer"] description: "Person who uses a computer or network service" topic_path: "technology/computing" source: "https://en.wikipedia.org/wiki/User_(computing)" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Person who uses a computer or network service ::

::figure[src="https://upload.wikimedia.org/wikipedia/commons/9/9a/System-users-3.svg" caption="icon]] of a person."] ::

::figure[src="https://upload.wikimedia.org/wikipedia/commons/1/17/Soulseek_chat_room.png" caption="country flags]] to indicate where each user is from"] ::

A user is a person who uses a computer or network service. A user typically has a user account and is recognized by the system through a username. Some software products provide services to other systems and have no direct end users.

End user

Main article: End user

End users are the ultimate human users (also referred to as operators) of a software product. The end user stands in contrast to users who support or maintain the product such as sysops, database administrators and computer technicians. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users.{{cite journal | url = http://web.media.mit.edu/~lieber/Publications/End-User-Software-Engineering.pdf | url-status = live | archive-url = https://web.archive.org/web/20110401200320/http://web.media.mit.edu/~lieber/Publications/End-User-Software-Engineering.pdf | archive-date = 1 April 2011 | title = The State of the Art in End-User Software Engineering | date = April 2011 | journal = ACM Computing Surveys |doi = 10.1145/1922649.1922658 | last1 = Ko | first1 = Andrew J. | last2 = Abraham | first2 = Robin | last3 = Beckwith | first3 = Laura | last4 = Blackwell | first4 = Alan | last5 = Burnett | first5 = Margaret | last6 = Erwig | first6 = Martin | last7 = Scaffidi | first7 = Chris | last8 = Lawrance | first8 = Joseph | last9 = Lieberman | first9 = Henry | last10 = Myers | first10 = Brad | last11 = Rosson | first11 = Mary Beth | last12 = Rothermel | first12 = Gregg | last13 = Shaw | first13 = Mary | last14 = Wiedenbeck | first14 = Susan | s2cid = 9435548 | volume = 43 | issue = 3 | pages = 1–44

In user-centered design, personas are created to represent the types of users. It is sometimes specified for each persona which types of user interfaces it is comfortable with (due to previous experience or the interface's inherent simplicity), and what technical expertise and degree of knowledge it has in specific fields or disciplines. When few constraints are imposed on the end-user category, especially when designing programs for use by the general public, it is common practice to expect minimal technical expertise or previous training in end users.

The end-user development discipline blurs the typical distinction between users and developers. It designates activities or techniques in which people who are not professional developers create automated behavior and complex data objects without significant knowledge of a programming language.

Systems whose actor is another system or a software agent have no direct end users.

User account

A user's account allows a user to authenticate to a system and potentially to receive authorization to access resources provided by or connected to that system; however, authentication does not imply authorization. To log into an account, a user is typically required to authenticate oneself with a password or other credentials for the purposes of accounting, security, logging, and resource management.

Once the user has logged on, the operating system will often use an identifier such as an integer to refer to them, rather than their username, through a process known as identity correlation. In Unix systems, the username is correlated with a user identifier or user ID.

Computer systems operate in one of two types based on what kind of users they have:

  • Single-user systems do not have a concept of several user accounts.
  • Multi-user systems have such a concept, and require users to identify themselves before using the system.

Each user account on a multi-user system typically has a home directory, in which to store files pertaining exclusively to that user's activities, which is protected from access by other users (though a system administrator may have access). User accounts often contain a public user profile, which contains basic information provided by the account's owner. The files stored in the home directory (and all other directories in the system) have file system permissions which are inspected by the operating system to determine which users are granted access to read or execute a file, or to store a new file in that directory.

While systems expect most user accounts to be used by only a single person, many systems have a special account intended to allow anyone to use the system, such as the username "anonymous" for anonymous FTP and the username "guest" for a guest account.

Password storage

On Unix systems, local user accounts are stored in the file [/etc/passwd](passwd-password-file), while user passwords may be stored at [/etc/shadow](passwd-shadow-file) in its hashed form.

On Microsoft Windows, user passwords can be managed within the Credential Manager program. The passwords are located in the Windows profile directory.

Username format

Various computer operating-systems and applications expect/enforce different rules for the format.

In Microsoft Windows environments, for example, note the potential use of: | url = https://msdn.microsoft.com/en-us/library/windows/desktop/aa380525%28v=vs.85%29.aspx | title = User Name Formats | website = MSDN | series = Developer technologies | publisher = Microsoft | access-date = 2016-01-11 | quote = The down-level logon name format is used to specify a domain and a user account in that domain [...].

  • User Principal Name (UPN) format – for example: UserName@Example.com
  • Down-Level Logon Name format – for example: DOMAIN\UserName

Terminology

Some usability professionals have expressed their dislike of the term "user" and have proposed changing it. Don Norman stated that "One of the horrible words we use is 'users'. I am on a crusade to get rid of the word 'users'. I would prefer to call them 'people'."

The term "user" may imply lack of the technical expertise required to fully understand how computer systems and software products work. Power users use advanced features of programs, though they are not necessarily capable of computer programming and system administration.{{cite web | url = https://help.sap.com/saphelp_nw70ehp2/helpdata/en/1e/013f420e09b26be10000000a155106/frameset.htm | title = Power Users' Guide | access-date = 2015-01-14 | website = SAP Help Portal |url-status=live |archive-url=https://web.archive.org/web/20150627173157/https://help.sap.com/saphelp_nw70ehp2/helpdata/en/1e/013f420e09b26be10000000a155106/frameset.htm |archive-date= Jun 27, 2015 | url = https://technet.microsoft.com/en-us/magazine/hh824683.aspx | title = Windows Confidential: Power to the Power User | date = Feb 2012 | access-date = 2015-01-14 | website = Microsoft |first1=Raymond |last1=Chen |url-status=live |archive-url=https://web.archive.org/web/20150404094645/https://technet.microsoft.com/en-us/magazine/hh824683.aspx |archive-date= Apr 4, 2015

Notes

References

References

  1. (2004-05-06). "Understanding Organizational Stakeholders for Design Success".
  2. Rigsbee, Sarah, and William B. Fitzpatrick. "[http://www.jhuapl.edu/techdigest/td/td3101/31_01_Rigsbee.pdf User-Centered Design: A Case Study on Its Application to the Tactical Tomahawk Weapons Control System.] {{Webarchive. link. (2017-10-14 "''Johns Hopkins APL Technical Digest'' 31.1 (2012): 76–82.)
  3. (September 1996). "What is end user?".
  4. (7 March 2021). "What is /etc/passwd and /etc/shadow files".
  5. "[Solved] Where Are Passwords Stored in Windows 10/11".
  6. "Password Storage Locations For Popular Windows Applications".
  7. Don Norman. (17 November 2008). "Words Matter. Talk About People: Not Customers, Not Consumers, Not Users".
  8. (February 2010). "Don Norman at UX Week 2008 © Adaptive Path".
  9. "User".

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

computing-terminologyidentity-managementconsumer