A pseudonym (ˈsjuːdənɪm; ) or alias (ˈeɪli.əs) is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individual's own. Many pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve and often fraught with legal issues. Pseudonyms include stage names, user names, ring names, pen names, aliases, superhero or villain identities and code names, gamer identifications, and regnal names of emperors, popes, and other monarchs. In some cases, it may also include nicknames. Historically, they have sometimes taken the form of anagrams, Graecisms, and Latinisations. Pseudonyms should not be confused with new names that replace old ones and become the individual's full-time name. Pseudonyms are "part-time" names, used only in certain contexts: to provide a more clear-cut separation between one's private and professional lives, to showcase or enhance a particular persona, or to hide an individual's real identity, as with writers' pen names, graffiti artists' tags, resistance fighters' or terrorists' noms de guerre, computer hackers' handles, and other online identities for services such as social media, online gaming, and internet forums. Actors, voice-over artists, musicians, and other performers sometimes use stage names, for example, to better channel relevant energy, gain a greater sense of security and comfort via privacy, more easily avoid troublesome fans/"stalkers", or to mask their ethnic backgrounds. In some cases, pseudonyms are adopted because they are part of a cultural or organisational tradition; for example, devotional names are used by members of some religious institutes, and "cadre names" are used by Communist party leaders such as Trotsky and Lenin. A collective name or collective pseudonym is one shared by two or more persons, for example, the co-authors of a work, such as Carolyn Keene, Erin Hunter, Ellery Queen, Nicolas Bourbaki, or James S.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related courses (3)
CS-234: Technologies for democratic society
This course will offer students a broad but hands-on introduction to technologies of human self-organization.
CS-523: Advanced topics on privacy enhancing technologies
This advanced course will provide students with the knowledge to tackle the design of privacy-preserving ICT systems. Students will learn about existing technologies to prect privacy, and how to evalu
CS-438: Decentralized systems engineering
A decentralized system is one that works when no single party is in charge or fully trusted. This course teaches decentralized systems principles while guiding students through the engineering of thei
Related lectures (34)
Anonymity and Accountability
Explores the significance of anonymity in avoiding judgment based on personal characteristics and the need to balance it with accountability.
Anonymity and Governance in Online Forums
Discusses anonymity, dark side issues, mitigation strategies, and governance in online forums.
Sybil Defenses: Artificial Costs
Explores Sybil defenses, social network defenses, Proof of Personhood, and next steps in cybersecurity.
Show more
Related publications (7)

Blockchain-based Practical Multi-agent Secure Comparison and its Application in Auctions

Boi Faltings, Sujit Prakash Gujar, Sankarshan Damle

AI applications find widespread use in a variety of domains. For further acceptance, mostly when multiple agents interact with the system, we must aim to preserve the privacy of participants information in such applications. Towards this, the Yao’s Million ...
ACM2022

Adjustable deterministic pseudonymization of speech

Mathew Magimai Doss, Subrahmanya Pavankumar Dubagunta

While public speech resources become increasingly available, there is a growing interest to preserve the privacy of the speakers, through methods that anonymize the speaker information from speech while preserving the spoken linguistic content. In this pap ...
ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD2022

Using “proof of personhood” to tackle social media risks

The ease of creating fake virtual identities plays an important role in shaping the way information — and misinformation — circulates online. Social media platforms are increasingly prominent in shaping public debates, and the tension between online anonym ...
International Risk Governance Center (IRGC)2021
Show more
Related people (1)
Related concepts (16)
Anonymity
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty.
Cryptography
Cryptography, or cryptology (from κρυπτός "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others.
Personal data
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates has four common variants based on personal or personally, and identifiable or identifying. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.