Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Pseudonym

From Wikipedia, the free encyclopedia
Fictitious name used for a particular purpose
"Aliases" redirects here. For other uses, seeAlias (disambiguation)."Pseud." redirects here. For the column in Private Eye, seeList of regular mini-sections in Private Eye § Pseuds Corner."Allonym" redirects here. For a definition of that term, see the Wiktionary entryallonym.

Apseudonym (/ˈsjdənɪm/; from Ancient Greek ψευδώνυμος (pseudṓnumos) 'falsely named') oralias (/ˈli.əs/) is a fictitious name that a person assumes for a particular purpose, which differs from their original or true name (orthonym).[1][2] This also differs from a new name that entirely or legally replaces an individual's own. Many pseudonym holders use them because they wish to remainanonymous and maintain privacy, though this may be difficult to achieve as a result of legal issues.[3]

Scope

[edit]
icon
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(November 2022) (Learn how and when to remove this message)

Pseudonyms includestage names,user names,ring names,pen names, aliases,superhero or villain identities and code names, gamertags, andregnal names of emperors, popes, and other monarchs. In some cases, it may also includenicknames. Historically, they have sometimes taken the form ofanagrams, Graecisms, andLatinisations.[4]

Pseudonyms are different from new names that replace old ones. Pseudonyms are "part-time" names, used only in certain contexts: to provide a more clear-cut separation between one's private and professional lives, to showcase or enhance a particular persona, or to hide an individual's real identity, as with writers' pen names, graffiti artists' tags,resistance fighters' or terrorists'noms de guerre, computerhackers'handles, and otheronline identities for services such associal media,online gaming, andinternet forums. Actors, musicians, and other performers sometimes usestage names for a degree of privacy, to better market themselves, and other reasons.[5]

Some pseudonyms are part of a cultural or organisational tradition; for example,devotional names are used by members of somereligious institutes,[6] and "cadre names" are used byCommunist party leaders such asTrotsky andLenin.

Collective pseudonyms

[edit]

Acollective name orcollective pseudonym is one shared by two or more persons, for example, the co-authors of a work, such asCarolyn Keene,Erin Hunter,Ellery Queen,Nicolas Bourbaki, orJames S. A. Corey.

Publius was a collective pseudonym used byJames Madison,Alexander Hamilton andJohn Jay in writingThe Federalist Papers. The individual authorship of some of the papers isstill debated.

Etymology

[edit]

Pseudonym comes from the Greekψευδώνυμονpseudṓnymon 'false name'[7], fromψεῦδοςpseûdos 'lie, falsehood'[8] andὄνομα (ónoma) 'name'.[9]Alias is a Latinadverb meaning "at another time, elsewhere".[10]

Usage

[edit]

Name change

[edit]
Main article:Name change

Sometimes people change their names in such a manner that the new name becomes permanent and is used by all who know the person. This is not an alias or pseudonym, but in fact a new name. In many countries, includingcommon law countries, a name change can be ratified by a court and become a person's new legal name.

Concealing identity

[edit]

Pseudonymous authors may still have their various identities linked together throughstylometric analysis of their writing style. The precise degree of this unmasking ability and its ultimate potential is uncertain, but the privacy risks are expected to grow with improved analytic techniques andtext corpora. Authors may practiceadversarial stylometry to resist such identification.[11]

Business

[edit]

Businesspersons of ethnic minorities in some parts of the world are sometimes advised by an employer to use a pseudonym that is common or acceptable in that area when conducting business, to overcome racial or religious bias.[12]

Criminal activity

[edit]
Further information:Identity fraud

Criminals may use aliases,fictitious business names, anddummy corporations (corporate shells) to hide their identity, or to impersonate other persons or entities in order to commit fraud. Aliases and fictitious business names used for dummy corporations may become so complex that, in the words ofThe Washington Post, "getting to the truth requires a walk down a bizarre labyrinth" and multiple government agencies may become involved to uncover the truth.[13] Giving a false name to a law enforcement officer is a crime in many jurisdictions.

Literature

[edit]
A youngGeorge Sand (real name "Amantine Lucile Dupin")
William Sydney Porter, who went by the pen name O. Henry or Olivier Henry, in 1909

Apen name is a pseudonym (sometimes a particular form of the real name) adopted by anauthor (or on the author's behalf by their publishers). English usage also includes the French-language phrasenom de plume (which in French literally means "pen name").[14]

The concept of pseudonymity has a long history. In ancient literature it was common to write in the name of a famous person, not for concealment or with any intention of deceit; in the New Testament, the second letter of Peter is probably such. A more modern example is all ofThe Federalist Papers, which were signed by Publius, a pseudonym representing the trio ofJames Madison,Alexander Hamilton, andJohn Jay. The papers were written partially in response to severalAnti-Federalist Papers, also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern with certainty which of the three authored a few of the papers. There are also examples of modern politicians and high-ranking bureaucrats writing under pseudonyms.[15][16]

Some female authors have used male pen names, in particular in the 19th century, when writing was a highly male-dominated profession. TheBrontë sisters used pen names for their early work, so as not to reveal their gender (see below) and so that local residents would not suspect that the books related to people of their neighbourhood.Anne Brontë'sThe Tenant of Wildfell Hall (1848) was published under the name Acton Bell, whileCharlotte Brontë used the name Currer Bell forJane Eyre (1847) andShirley (1849), andEmily Brontë adopted Ellis Bell as cover forWuthering Heights (1847). Other examples from the nineteenth-century are novelist Mary Ann Evans (George Eliot) and French writer Amandine Aurore Lucile Dupin (George Sand). Pseudonyms may also be used due to cultural or organization or political prejudices.

Similarly, some 20th- and 21st-century male romance novelists – a field dominated by women – have used female pen names.[17] A few examples are Brindle Chase,Peter O'Donnell (as Madeline Brent),Christopher Wood (as Penny Sutton and Rosie Dixon), andHugh C. Rae (as Jessica Sterling).[17]

A pen name may be used if a writer's real name is likely to be confused with the name of another writer or notable individual, or if the real name is deemed unsuitable.

Authors who write both fiction and non-fiction, or in different genres, may use different pen names to avoid confusing their readers. For example, the romance writerNora Roberts writes mystery novels under the nameJ. D. Robb.

In some cases, an author may become better known by their pen name, rather than their real name. Some famous examples of that include Samuel Clemens, writing asMark Twain, Theodor Geisel, better known asDr. Seuss, and Eric Arthur Blair (George Orwell). The British mathematician Charles Dodgson wrote fantasy novels asLewis Carroll and mathematical treatises under his own name.

Some authors, such asHarold Robbins, use several literary pseudonyms.[18]

Some pen names have been used for long periods, even decades, without the author's true identity being discovered, as withElena Ferrante andTorsten Krol.

Joanne Rowling[19] published theHarry Potter series as J. K. Rowling. Rowling also published theCormoran Strike series of detective novels includingThe Cuckoo's Calling under the pseudonym Robert Galbraith.

Winston Churchill wrote asWinston S. Churchill (from his full surname Spencer Churchill which he did not otherwise use) in an attempt to avoid confusion with anAmerican novelist of the same name. The attempt was not wholly successful – the two are still sometimes confused by booksellers.[20][21]

A pen name may be used specifically to hide the identity of the author, as withexposé books about espionage or crime, or explicit erotic fiction.Erwin von Busse used a pseudonym when he published short stories about sexually charged encounters between men in Germany in 1920.[22] Some prolific authors adopt a pseudonym to disguise the extent of their published output, e. g.Stephen King writing asRichard Bachman. Co-authors may choose to publish under a collective pseudonym, e. g.,P. J. Tracy andPerri O'Shaughnessy.Frederic Dannay andManfred Lee used the nameEllery Queen as a pen name for their collaborative works and as the name of their main character.[23]Asa Earl Carter, a Southern white segregationist affiliated with the KKK, wrote Western books under a fictional Cherokee persona to imply legitimacy and conceal his history.[24]

A famous case in French literature wasRomain Gary. Already a well-known writer, he started publishing books as Émile Ajar to test whether his new books would be well received on their own merits, without the aid of his established reputation. They were: Émile Ajar, like Romain Gary before him, was awarded the prestigiousPrix Goncourt by a jury unaware that they were the same person. Similarly, TV actorRonnie Barker submitted comedy material under the name Gerald Wiley.

A collective pseudonym may represent an entire publishing house, or any contributor to a long-running series, especially with juvenile literature. Examples includeWatty Piper,Victor Appleton,Erin Hunter, and Kamiru M. Xhan.

Another use of a pseudonym in literature is to present a story as being written by the fictional characters in the story. The series of novels known asA Series of Unfortunate Events are written byDaniel Handler under the pen name ofLemony Snicket, a character in the series. This applies also to some of the several 18th-century English and American writers who used the nameFidelia.

Ananonymity pseudonym ormultiple-use name is a name used by many different people to protect anonymity.[25] It is a strategy that has been adopted by many unconnected radical groups and by cultural groups, where the construct of personal identity has been criticised. This has led to the idea of the "open pop star", such asMonty Cantsin.[clarification needed]

Medicine

[edit]

Pseudonyms andacronyms are often employed in medical research toprotect subjects' identities through a process known asde-identification.

Science

[edit]
Further information:Academic authorship § Anonymous and unclaimed authorship

Nicolaus Copernicus put forward his theory of heliocentrism in the manuscriptCommentariolus anonymously, in part because of his employment as a law clerk for achurch-government organization.[26]

Sophie Germain andWilliam Sealy Gosset used pseudonyms to publish their work in the field of mathematics – Germain, to avoid rampant 19th century academicmisogyny, and Gosset, to avoid revealing brewing practices of his employer, theGuinness Brewery.[27][28]

Satoshi Nakamoto is a pseudonym of a still unknown author or authors' group behind awhite paper aboutbitcoin.[29][30][31][32]

Military and paramilitary organizations

[edit]
[icon]
This sectionneeds expansion. You can help byadding to it.(April 2025)

While taking part in military activities, such as fighting in a war, the pseudonym might be known as anom de guerre. It is chosen by the person involved in the activity.[33][34]

Online activity

[edit]

Individuals using a computeronline may adopt or be required to use a form of pseudonym known as a "handle" (a term deriving fromCB slang), "user name", "login name", "avatar", or, sometimes, "screen name", "gamertag", "IGN (InGame (Nick)Name)" or "nickname". On the Internet,pseudonymous remailers usecryptography that achieves persistent pseudonymity, so that two-way communication can be achieved, and reputations can be established, without linking physicalidentities to their respective pseudonyms.Aliasing is the use of multiple names for the same data location.

More sophisticated cryptographic systems, such as anonymousdigital credentials, enable users to communicate pseudonymously (i.e., by identifying themselves by means of pseudonyms). In well-defined abuse cases, a designated authority may be able to revoke the pseudonyms and reveal the individuals' real identity.[citation needed]

Use of pseudonyms is common among professionaleSports players, despite the fact that many professional games are played onLAN.[35]

Pseudonymity has become an important phenomenon on the Internet and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity,[36] ranging from highly linkablepublic pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkablenon-public pseudonyms (the link is known to system operators but is not publicly disclosed), andunlinkable pseudonyms (the link is not known to system operators and cannot be determined).[37] For example, trueanonymous remailer enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunctPenet remailer) are calledpseudonymous remailers.

The continuum of unlinkability can also be seen, in part, on Wikipedia. Some registered users make no attempt to disguise their real identities (for example, by placing their real name on their user page). The pseudonym of unregistered users is theirIP address, which can, in many cases, easily be linked to them. Other registered users prefer to remain anonymous, and do not disclose identifying information. However, in certain cases,Wikipedia's privacy policy permits system administrators to consult the server logs to determine the IP address, and perhaps the true name, of a registered user. It is possible, in theory, to create an unlinkable Wikipedia pseudonym by using anOpen proxy, a web server that disguises the user's IP address. But most open proxy addresses are blocked indefinitely due to their frequent use by vandals. Additionally, Wikipedia's public record of a user's interest areas, writing style, and argumentative positions may still establish an identifiable pattern.[38][39]

System operators (sysops) at sites offering pseudonymity, such as Wikipedia, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior, are equally unenthusiastic.[40] Still, some users and privacy activists like theAmerican Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (includingunintentional disclosures of their personal information anddoxing, as discussed in the next section). Their views are supported by laws in some nations (such as Canada) that guarantee citizens a right to speak using a pseudonym.[41] This right does not, however, give citizens the right to demand publication of pseudonymous speech on equipment they do not own.

Confidentiality

[edit]

Most websites that offer pseudonymity retain information about users. These sites are often susceptible to unauthorized intrusions into their non-public database systems. For example, in 2000, a Welsh teenager obtained information about more than 26,000 credit card accounts, including that of Bill Gates.[42][43] In 2003, VISA and MasterCard announced that intruders obtained information about 5.6 million credit cards.[44] Sites that offer pseudonymity are also vulnerable to confidentiality breaches. In a study of a Web dating service and apseudonymous remailer,University of Cambridge researchers discovered that the systems used by these Web sites to protect user data could be easily compromised, even if the pseudonymous channel is protected by strong encryption. Typically, the protected pseudonymous channel exists within a broader framework in which multiple vulnerabilities exist.[45] Pseudonym users should bear in mind that, given the current state of Web security engineering, their true names may be revealed at any time.

Online reputations

[edit]

Pseudonymity is an important component of the reputation systems found in online auction services (such aseBay), discussion sites (such asSlashdot), and collaborative knowledge development sites (such asWikipedia). A pseudonymous user who has acquired a favorable reputation gains the trust of other users. When users believe that they will be rewarded by acquiring a favorable reputation, they are more likely to behave in accordance with the site's policies.[46]

If users can obtain new pseudonymous identities freely or at a very low cost, reputation-based systems are vulnerable to whitewashing attacks,[47] also calledserial pseudonymity, in which abusive users continuously discard their old identities and acquire new ones in order to escape the consequences of their behavior: "On the Internet, nobody knows that yesterday you were a dog, and therefore should be in the doghouse today."[48] Users of Internet communities who have been banned only to return with new identities are calledsock puppets. Whitewashing is one specific form of aSybil attack on distributed systems.

Comment quality onDisqus by type[49][50]

The social cost of cheaply discarded pseudonyms is that experienced users lose confidence in new users,[51] and may subject new users to abuse until they establish a good reputation.[48] System operators may need to remind experienced users that most newcomers are well-intentioned (see, for example,Wikipedia's policy about biting newcomers). Concerns have also been expressed about sock puppets exhausting the supply of easily remembered usernames. In addition a recent research paper demonstrated that people behave in a potentially more aggressive manner when using pseudonyms/nicknames (due to theonline disinhibition effect) as opposed to being completely anonymous.[52][53] In contrast, research by the blog comment hosting serviceDisqus found pseudonymous users contributed the "highest quantity and quality of comments", where "quality" is based on an aggregate of likes, replies, flags, spam reports, and comment deletions,[49][50] and found that users trusted pseudonyms and real names equally.[54]

Comment types used onHuffPost using different kinds of anonymity[55]

Researchers at the University of Cambridge showed that pseudonymous comments tended to be more substantive and engaged with other users in explanations, justifications, and chains of argument, and less likely to use insults, than either fully anonymous or real name comments.[55] Proposals have been made to raise the costs of obtaining new identities, such as by charging a small fee or requiring e-mail confirmation. Academic research has proposed cryptographic methods to pseudonymize social media identities[56] or government-issued identities,[57] to accrue and useanonymous reputation in online forums,[58] or to obtain one-per-person and hence less readily-discardable pseudonyms periodically at physical-worldpseudonym parties.[59] Others point out that Wikipedia's success is attributable in large measure to its nearly non-existent initial participation costs.

Privacy

[edit]

People seeking privacy often use pseudonyms to make appointments and reservations.[60] Those writing toadvice columns in newspapers and magazines may use pseudonyms.[61]Steve Wozniak used a pseudonym when attending theUniversity of California, Berkeley after co-foundingApple Computer, because "[he] knew [he] wouldn't have time enough to be an A+ student."[62]

Stage names

[edit]
Main article:Stage name

When used by an actor, musician, radio disc jockey, model, or other performer or "show business" personality a pseudonym is called astage name, or, occasionally, aprofessional name, orscreen name.

Film, theatre, and related activities

[edit]

Members of a marginalized ethnic or religious group have often adopted stage names, typically changing their surname or entire name to mask their original background.

Stage names are also used to create a more marketable name, as in the case of Creighton Tull Chaney, who adopted the pseudonymLon Chaney Jr., a reference to his famous fatherLon Chaney.

Chris Curtis ofDeep Purple fame was christened as Christopher Crummey ("crummy" is UK slang for poor quality). In this and similar cases a stage name is adopted simply to avoid an unfortunate pun.

Pseudonyms are also used to comply with the rules of performing-artsguilds (Screen Actors Guild (SAG),Writers Guild of America, East (WGA),AFTRA, etc.), which do not allow performers to use an existing name, in order to avoid confusion. For example, these rules required film and television actor Michael Fox to add a middle initial and becomeMichael J. Fox, to avoid being confused with another actor namedMichael Fox. This was also true of author and actressFannie Flagg, who shared her real name, Patricia Neal, withanother well-known actress;Rick Copp, who chose the pseudonym name Richard Hollis, which is also the name of a character in the anthology TV seriesFemme Fatales; and British actorStewart Granger, whose real name was James Stewart. The film-making team ofJoel and Ethan Coen, for instance, share credit for editing under the alias Roderick Jaynes.[63]

Some stage names are used to conceal a person's identity, such as the pseudonymAlan Smithee, which was used by directors in theDirectors Guild of America (DGA) to remove their name from a film they feel was edited or modified beyond their artistic satisfaction. In theatre, the pseudonymsGeorge or Georgina Spelvin, andWalter Plinge are used to hide the identity of a performer, usually when he or she is "doubling" (playing more than one role in the same play).

David Agnew was a name used by the BBC to conceal the identity of a scriptwriter, such as for theDoctor Who serialCity of Death, which had three writers, includingDouglas Adams, who was at the time of writing, the show's script editor.[64] In another Doctor Who serial,The Brain of Morbius, writerTerrance Dicks demanded the removal of his name from the credits saying it could go out under a "bland pseudonym".[citation needed][65] This ended up as "Robin Bland".[65][66]

Pornographic actors regularly use stage names.[67][68][69] Sometimes these are referred to asnom de porn (like withnom de plume, this is English-language users creating a French-language phrase to use in English). Having acted in pornographic films can be a serious detriment to finding another career.[70][71]

Music

[edit]
icon
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.
Find sources: "Pseudonym" – news ·newspapers ·books ·scholar ·JSTOR
(September 2018) (Learn how and when to remove this message)

Musicians and singers can use pseudonyms to allow artists to collaborate with artists on other labels while avoiding the need to gain permission from their own labels, such as the artistJerry Samuels, who made songs under Napoleon XIV. Rock singer-guitaristGeorge Harrison, for example, played guitar onCream's song "Badge" using a pseudonym.[72] In classical music, some record companies issued recordings under anom de disque in the 1950s and 1960s to avoid paying royalties. A number of popular budget LPs of piano music were released under the pseudonymPaul Procopolis.[73] Another example is thatPaul McCartney used his fictional name "Bernerd Webb" forPeter and Gordon's songWoman.[74]

Pseudonyms are used as stage names inheavy metal bands, such asTracii Guns inLA Guns,Axl Rose andSlash inGuns N' Roses,Mick Mars inMötley Crüe,Dimebag Darrell inPantera, orC.C. Deville inPoison. Some such names have additional meanings, like that of Brian Hugh Warner, more commonly known asMarilyn Manson: Marilyn coming fromMarilyn Monroe and Manson from convicted serial killerCharles Manson.Jacoby Shaddix ofPapa Roach went under the name "Coby Dick" during theInfest era. He changed back to his birth name whenlovehatetragedy was released.

David Johansen, frontman for the hard rock bandNew York Dolls, recorded and performed pop and lounge music under the pseudonym Buster Poindexter in the late 1980s and early 1990s. The music video for Poindexter's debut single,Hot Hot Hot, opens with a monologue from Johansen where he notes his time with the New York Dolls and explains his desire to create more sophisticated music.

Ross Bagdasarian Sr., creator ofAlvin and the Chipmunks, wrote original songs, arranged, and produced the records under his real name, but performed on them asDavid Seville. He also wrote songs as Skipper Adams. Danish pop pianistBent Fabric, whose full name is Bent Fabricius-Bjerre, wrote his biggest instrumental hit "Alley Cat" as Frank Bjorn.

For a time, the musicianPrince used an unpronounceable "Love Symbol" as a pseudonym ("Prince" is his actual first name rather than a stage name). He wrote the song "Sugar Walls" forSheena Easton as "Alexander Nevermind" and "Manic Monday" forthe Bangles as "Christopher Tracy". (He also produced albums early in his career as "Jamie Starr").

Many Italian-American singers have used stage names, as their birth names were difficult to pronounce or considered too ethnic for American tastes. Singers changing their names includedDean Martin (born Dino Paul Crocetti),Connie Francis (born Concetta Franconero),Frankie Valli (born Francesco Castelluccio),Tony Bennett (born Anthony Benedetto), andLady Gaga (born Stefani Germanotta)

In 2009, the British rock bandFeeder briefly changed their name toRenegades so they could play a whole show featuring a set list in which 95 per cent of the songs played were from their forthcoming new album of the same name, with none of their singles included. FrontmanGrant Nicholas felt that if they played as Feeder, there would be an uproar over him not playing any of the singles, so he used the pseudonym as a hint. A series of small shows were played in 2010, at 250 to 1,000-capacity venues, with the plan to not say who the band really was, and to just announce the shows as if they were a new band.

In many cases, hip-hop and rap artists prefer to use pseudonyms that represents some variation of their name, personality, or interests. Examples includeIggy Azalea (her stage name is a combination of her dog's name, Iggy, and her home street inMullumbimby, Azalea Street),Ol' Dirty Bastard (known under at least six aliases),Diddy (previously known at various times as Puffy, P. Diddy, and Puff Daddy),Ludacris,Flo Rida (whose stage name is a tribute to his home state,Florida), British-Jamaican hip-hop artistStefflon Don (real name Stephanie Victoria Allen),LL Cool J, andChingy.Black metal artists also adopt pseudonyms, usually symbolizing dark values, such asNocturno Culto,Gaahl, Abbath, and Silenoz. In punk and hardcore punk, singers and band members often replace real names with tougher-sounding stage names such asSid Vicious of the late 1970s bandSex Pistols and "Rat" of the early 1980s bandThe Varukers and the 2000s re-formation ofDischarge. The punk rock bandThe Ramones had every member take the last name of Ramone.[citation needed]

Henry John Deutschendorf Jr., an American singer-songwriter, used the stage nameJohn Denver. The Australian country musician born Robert Lane changed his name toTex Morton. Reginald Kenneth Dwight legally changed his name in 1972 toElton John.

See also

[edit]

Notes

[edit]
  1. ^Room (2010, 3).
  2. ^"pseudonym".Lexico UK English Dictionary.Oxford University Press. Archived fromthe original on 10 August 2020.
  3. ^du Pont, George F. (2001)The Criminalization of True Anonymity in CyberspaceArchived 21 February 2006 at theWayback Machine 7 Mich. Telecomm. Tech. L. Rev.
  4. ^Peschke (2006, vii).
  5. ^Phillips, Damon J.; Kim, Young-Kyu (2009)."Why Pseudonyms? Deception as Identity Preservation Among Jazz Record Companies, 1920–1929".Organization Science.20 (3):481–499.doi:10.1287/orsc.1080.0371.ISSN 1047-7039.
  6. ^Jones, Lindsay; Eliade, Mircea; Adams, Charles J., eds. (2005).Encyclopedia of religion (2nd ed.). Detroit: Macmillan Reference USA. pp. Names in Religion: Devotional Names in Various Religious Traditions.ISBN 978-0-02-865733-2.
  7. ^Harper, Douglas."pseudonym".Online Etymology Dictionary. Retrieved2 August 2020.
  8. ^ψεῦδος,Henry George Liddell, Robert Scott,A Greek-English Lexicon, on Perseus project
  9. ^ὄνομαArchived 25 February 2021 at theWayback Machine, Henry George Liddell, Robert Scott,A Greek-English Lexicon, on Perseus project
  10. ^Cassell's Latin Dictionary, Marchant, J.R.V, & Charles, Joseph F., (Eds.), Revised Edition, 1928
  11. ^Gröndahl & Asokan 2020, p. 16.
  12. ^Robertson, Nan,The Girls in the Balcony: Women, Men, andThe New York Times (N.Y.: Random House, [2nd printing?] 1992 (ISBN 0-394-58452-X)), p. 221. In 1968, one such employer wasThe New York Times, the affected workers were classified-advertising takers, and the renaming was away from Jewish, Irish, and Italian names to ones "with aWASP flavor".
  13. ^The Ruse That Roared,The Washington Post, 5 November 1995, Richard Leiby, James Lileks
  14. ^Please note this is an English construction, and the idiomatic French phrase isnom de guerre discussedbelow. Seenom de plume for details.
  15. ^Gerstein, Josh; Mccaskill, Nolan D. (23 September 2016)."Obama used a pseudonym in emails with Clinton, FBI documents reveal".Politico.
  16. ^Weaver, Dustin (1 May 2013)."Former EPA chief under fire for new batch of "Richard Windsor" emails".The Hill.
  17. ^abNaughton, Julie (1 June 2012)."Yes, Virgil, There Are Men Writing Romance: Focus on Romance 2012".Publishers Weekly. Retrieved6 May 2014.
  18. ^Rubin, Harold Francis (1916–)Archived 14 January 2010 at theWayback Machine, Author Pseudonyms: R. Accessed 27 November 2009.
  19. ^"J.K. Rowling". c. 2019. Retrieved5 August 2020.
  20. ^"Two Winston Churchills".The Age, Hosted on Google News. 19 October 1940. Retrieved25 October 2013.
  21. ^Churchill, Winston (11 May 2010).My Early Life - Related Books. Simon and Schuster.ISBN 978-1-4391-2506-9. Retrieved25 October 2013.
  22. ^Granand (2022).Berlin Garden of Erotic Delights. Waterbury Press.
  23. ^"Whodunit?".Ellery Queen, A Website on Deduction. Retrieved1 May 2022.
  24. ^Carter, Dan T. (4 October 1991)."The Transformation of a Klansman".The New York Times. Archived fromthe original on 2 July 2018. Retrieved18 May 2020.
  25. ^Home, Stewart (1987).Mind Invaders: A Reader in Psychic Warfare, Cultural Sabotage, and Semiotic Terrorism. Indiana University: Serpent's Tail. p. 119.ISBN 1-85242-560-1.
  26. ^Oxenham, Simon."soft question – Pseudonyms of famous mathematicians".MathOverflow. Retrieved12 January 2020.
  27. ^Case & Leggett 2005, p. 39.
  28. ^"soft question – Pseudonyms of famous mathematicians".MathOverflow. Retrieved12 January 2020.
  29. ^"The misidentification of Satoshi Nakamoto".theweek.com. 30 June 2015. Retrieved22 July 2019.
  30. ^Kharif, Olga (23 April 2019)."John McAfee vows to unmask Crypto's Satoshi Nakamoto, then backs off".Bloomberg.
  31. ^"Who is Satoshi Nakamoto, Inventor of Bitcoin? It doesn't matter".Fortune. Retrieved22 July 2019.
  32. ^Bearman, Sophie (27 October 2017)."Bitcoin's creator may be worth $6 billion – but people still don't know who it is".CNBC. Retrieved22 July 2019.
  33. ^"nom de guerre".Merriam-Webster Dictionary.Merriam-Webster. Retrieved1 February 2025.
  34. ^"nom de guerre".Cambridge Dictionary.Cambridge University Press. Retrieved1 February 2025.
  35. ^Cocke, Taylor (26 November 2013)."Why esports needs to ditch online aliases".onGamers. Archived fromthe original on 18 May 2015. Retrieved14 May 2015.
  36. ^Froomkin, A. Michael (1995)."Anonymity and Its Enemies".Journal of Online Law.1. art. 4.SSRN 2715621. Archived fromthe original on 25 May 2008.
  37. ^Pfitzmann, A., and M. Köhntopp (2000). "Anonymity, Unobservability, and Pseudonymity: A Proposal for TerminologyArchived 9 July 2011 at theWayback Machine". In H. Federrath (ed.),Anonymity (Berlin: Springer-Verlag), pp. 1-9.
  38. ^Rao, J.R., and P. Rohatgi (2000)."Can Pseudonyms Really Guarantee Privacy?"Archived 21 January 2021 at theWayback Machine Proceedings of the 9th USENIX Security Symposium (Denver, Colorado, 14–17 Aug. 2000).
  39. ^Novak, Jasmine; Raghavan, Prabhakar; Tomkins, Andrew (May 2004). "Anti-aliasing on the web".Proceedings of the 13th conference on World Wide Web - WWW '04. WWW '04: Proceedings of the 13th international conference on World Wide Web. New York, New York, USA: ACM Press. pp. 30–39.doi:10.1145/988672.988678.ISBN 978-1-58113-844-3.OCLC 327018361.
  40. ^Clarke, Roger (1998)."Technological Aspects of Internet Crime Prevention."Archived 14 August 2008 at theWayback Machine Paper presented at the Australian Institute for Criminology's Conference on Internet Crime ( 16–17 February 1998).
  41. ^"EFF Press Release: Federal Court Upholds Online Anonymous Speech in 2TheMart.com case". 20 April 2001. Archived fromthe original on 11 December 2006. Retrieved1 July 2020.
  42. ^"Teenagers hack Gates's credit card".The Irish Times. 31 March 2000. Retrieved21 February 2021.
  43. ^Enos, Lori (27 March 2000)."Welsh Teens Arrested for E-Commerce Hack Attacks".E-Commerce Times. Retrieved21 February 2021.
  44. ^Katayama, F. (2003)"Hacker accesses 5.6 Million Credit Cards"CNN.com: Technology (February 18, 2003).Archived 4 March 2016 at theWayback Machine
  45. ^Clayton, R.; Danezis, G.; Kuhn, M. (2001). "Real World Patterns of Failure in Anonymity Systems".Information Hiding(PDF). Lecture Notes in Computer Science. Vol. 2137. pp. 230–244.CiteSeerX 10.1.1.16.7923.doi:10.1007/3-540-45496-9_17.ISBN 978-3-540-42733-9.
  46. ^Kollock, P. (1999)."The Production of Trust in Online Markets."Archived 26 February 2009 at theWayback Machine In E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker (eds.),Advances in Group Processes (Greenwich, CT: JAI Press).
  47. ^Feldman, M., S. Papadimitriou, and J. Chuang (2004). "Free-Riding and Whitewashing in Peer-to-Peer Systems." Paper presented at SIGCOMM '04 Workshop (Portland, Oregon, 30 Aug. – 3 September 2004).
  48. ^abFriedman, E.; Resnick, P. (2001)."The Social Cost of Cheap Pseudonyms"(PDF).Journal of Economics and Management Strategy.10 (2):173–199.CiteSeerX 10.1.1.30.6376.doi:10.1162/105864001300122476.hdl:2027.42/71559. Archived fromthe original(PDF) on 23 November 2008.
  49. ^abDisqus."Pseudonyms drive communities". Archived fromthe original on 16 May 2016. Retrieved15 June 2016.
  50. ^abRosen, Rebecca J. (11 January 2012)."Real Names Don't Make for Better Commenters, but Pseudonyms Do".The Atlantic. Retrieved1 July 2020.
  51. ^Johnson, D.G.; Miller, K. (1998). "Anonymity, Pseudonymity, and Inescapable Identity on the Net".ACM SIGCAS Computers and Society.28 (2):37–38.doi:10.1145/276758.276774.
  52. ^Tsikerdekis, Michail (2011). "Engineering anonymity to reduce aggression online".Proceedings of the IADIS International Conference – Interfaces and Human Computer Interaction. Rome, Italy: IADIS – International association for development of the information society. pp. 500–504.
  53. ^Tsikerdekis Michail (2012). "The choice of complete anonymity versus pseudonymity for aggression online".EMinds International Journal on Human-Computer Interaction.2 (8):35–57.
  54. ^Roy, Steve (15 December 2014)."What's In A Name? Understanding Pseudonyms".The Disqus Blog. Retrieved11 July 2020.
  55. ^abFredheim, Rolf; Moore, Alfred (4 November 2015),Talking Politics Online: How Facebook Generates Clicks But Undermines Discussion,doi:10.2139/ssrn.2686164,SSRN 2686164
  56. ^Maheswaran, John; Jackowitz, Daniel; Zhai, Ennan; Wolinsky, David Isaac; Ford, Bryan (9 March 2016).Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities(PDF).6th ACM Conference on Data and Application Security and Privacy (CODASPY).Archived(PDF) from the original on 9 October 2022.
  57. ^Deepak Maram; Harjasleen Malvai; Fan Zhang; Nerla Jean-Louis; Alexander Frolov; Tyler Kell; Tyrone Lobban; Christine Moy; Ari Juels; Andrew Miller (28 September 2020)."CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability"(PDF).Archived(PDF) from the original on 9 October 2022.
  58. ^Ennan Zhai; David Isaac Wolinsky; Ruichuan Chen; Ewa Syta; Chao Teng; Bryan Ford (18 March 2016).AnonRep: Towards Tracking-Resistant Anonymous Reputation.13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16).
  59. ^Ford, Bryan; Strauss, Jacob (1 April 2008)."An Offline Foundation for Online Accountable Pseudonyms".Proceedings of the 1st workshop on Social network systems - SocialNets '08.1st Workshop on Social Network Systems – SocialNets '08. pp. 31–6.CiteSeerX 10.1.1.156.4099.doi:10.1145/1435497.1435503.ISBN 978-1-60558-124-8.
  60. ^Ryan, Harriet; Yoshino, Kimi (17 July 2009)."Investigators target Michael Jackson's pseudonyms".Los Angeles Times. Retrieved14 October 2012.
  61. ^"Toronto Daily Mail, "Women's Kingdom", "A Delicate Question", April 7, 1883, page 5". Retrieved14 October 2012.
  62. ^Stix, Harriet (14 May 1986)."A UC Berkeley Degree Is Now the Apple of Steve Wozniak's Eye".Los Angeles Times. Retrieved5 January 2015.
  63. ^"Roderick Jaynes, Imaginary Oscar Nominee for "No Country" – Vulture". Nymag.com. 22 January 2008. Retrieved14 October 2012.
  64. ^"BBC – Doctor Who Classic Episode Guide – City of Death – Details".bbc.co.uk. Archived fromthe original on 12 March 2007. Retrieved18 July 2015.
  65. ^abGallagher, William (27 March 2012)."Doctor Who's secret history of codenames revealed".Radio Times. Archived from the original on 27 February 2015. Retrieved31 March 2013.
  66. ^Howe, Walker and StammersDoctor Who the Handbook: The Fourth Doctor pp. 175–176.
  67. ^Miltmore, John (26 October 2017)."'Porn Star': Why We Should Probably Lose the Term".Intellectual Takeout. Retrieved7 February 2025.
  68. ^Marcus, Ruth (12 March 2014)."College porn star reflects base culture".Delaware Online. Retrieved7 February 2025.
  69. ^Confessions of a Porn Addict,The Spectator, 10 November 2001, p. 34
  70. ^Voss, Georgina (2015).Stigma and the Shaping of the Pornography Industry. Routledge. p. 52.
  71. ^Stev, Anne H., ed. (2020).The Microgenre: A Quick Look at Small Culture. Bloomsbury Academic. p. 99.
  72. ^Winn, John (2009).That Magic Feeling: The Beatles' Recorded Legacy, Volume Two, 1966–1970. Three Rivers Press. p. 229.ISBN 978-0-307-45239-9.
  73. ^"Saga Remembered by Robin O'Connor - February 2007 MusicWeb-International".www.musicweb-international.com. Retrieved18 April 2022.
  74. ^"45cat – Peter And Gordon – Woman / Wrong From The Start – Capitol – USA – 5579". 45cat. Retrieved30 June 2018.

Sources

[edit]

External links

[edit]
Look uppseudonym in Wiktionary, the free dictionary.
Wikisource has the text of the1911Encyclopædia Britannica article "Pseudonym".
Personal name
By sequence
By trait
By life situation
Pseudonyms (list)
By culture (surnames)
East Asia
Northern Asia
and Central Asia
North Africa
and Western Asia
Oceania
Sub-Saharan Africa
Europe,
Americas,
and Australasia
Baltic
Celtic
Germanic
Romance
Slavic
Uralic
Other
South and Southeast Asia
By religion
Manners of address (list)
Of authority andof honour
Styles
Titles
Related traditions
Related
International
National
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Pseudonym&oldid=1323949418"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp