UXC Dictionary: Difference between revisions
Jump to navigation
Jump to search
Mary Hodder (talk | contribs) No edit summary |
Mary Hodder (talk | contribs) No edit summary |
||
Line 4: | Line 4: | ||
|- | |- | ||
| User || Human. This does not include machines, algorithms, or other non-human agents or actors. || Our perspective is that this definition applies this way in any context in the IDESG framework. We suggest changing the use of USER for other meanings to another word. Note that the NSTIC document (see citation) names "user" as separate from devices and processes here on page 8: "Technology and processes for identification (establishing unique digital identities) and authentication (verifying the identity of a | | User || Human. This does not include machines, algorithms, or other non-human agents or actors. || Our perspective is that this definition applies this way in any context in the IDESG framework. We suggest changing the use of USER for other meanings to another word. Note that the NSTIC document (see citation) names "user" as separate from devices and processes here on page 8: "Technology and processes for identification (establishing unique digital identities) and authentication (verifying the identity of a | ||
user, process, or device) are at the forefront of this Strategy " | user, process, or device) are at the forefront of this Strategy " NSTIC Document: https://www.idecosystem.org/idesgwiki/images/b/bc/Full_NSTIC_Strategy_Document_-_04152012_ARR_Annotated_for_user_centric.pdf | ||
|| | |||
|- | |- | ||
| User-centric || Example || Sample usage from NSTIC: | | User-centric || Example || Sample usage from NSTIC: |
Revision as of 16:28, 28 July 2015
Term | Definition | Notes | Citations |
---|---|---|---|
User | Human. This does not include machines, algorithms, or other non-human agents or actors. | Our perspective is that this definition applies this way in any context in the IDESG framework. We suggest changing the use of USER for other meanings to another word. Note that the NSTIC document (see citation) names "user" as separate from devices and processes here on page 8: "Technology and processes for identification (establishing unique digital identities) and authentication (verifying the identity of a
user, process, or device) are at the forefront of this Strategy " NSTIC Document: https://www.idecosystem.org/idesgwiki/images/b/bc/Full_NSTIC_Strategy_Document_-_04152012_ARR_Annotated_for_user_centric.pdf |
|
User-centric | Example | Sample usage from NSTIC:
|
The common semantic domain is roughly referred to hereas:https://en.wikipedia.org/wiki/User-centered_design |
Entities | Any organization providing identity services. | Example | Example |
System | An entity's system a user is interacting with at a particular time. | Example | Example |
Anonymous | An interaction designed such that the data collected is not sufficient to infer the identity of the user involved nor is such data sufficient to permit an entity to associate multiple interactions with a user or to determine patterns of behavior with a user. | Example | Example |
Third Parties | Example | re: supplemental on Usable 3: research systems that display entities on a page or system. consider burden on user vs. accessibility of entities list) | Example |
Pseudonymous | An interaction designed such that the data collected is not sufficient to allow the entity to infer the user involved but which does permit an entity to associate multiple interactions with the user’s claimed identity. | Example | Example |
verified identity | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |