User

Known as: User name, Login name, User area 
A user is a person who uses a computer or network service. Users generally use a system or a software product without the technical expertise… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1956-2017
020040019562016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
As the market for mobile architectures continues its rapid growth, it has become increasingly important to understand and… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 5
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
I insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In 1995, Boehm predicted that by 2005, there would be "55 million performers" of "end user programming" in the United States. The… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
To cope with the ever increasing diversity of markup languages, programming languages, tool kits and interface development… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
End-user development (EUD) activities range from customization to component configuration and programming. Office software, such… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
End-user programming has become the most common form of programming in use today [2], but there has been little investigation… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The security of any computer system that is configured and operated by human beings critically depends on the information… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
It is increasingly common for computer users to have access to several computers on a network and hence to be able to execute… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Convivial systems encourage users to be actively engaged in generating creative extensions to the artifacts given to them… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?