fbpx
Wikipedia

Pseudonym

A pseudonym (/ˈsjdənɪm/; from Ancient Greek ψευδώνυμος (pseudṓnumos) 'falsely named') or alias (/ˈli.əs/) is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym).[1][2] This also differs from a new name that entirely or legally replaces an individual's own. Many pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve and often fraught with legal issues.[3]

Scope

Pseudonyms include stage names, user names, ring names, pen names, aliases, superhero or villain identities and code names, gamer identifications, and regnal names of emperors, popes, and other monarchs. In some cases, it may also include nicknames. Historically, they have sometimes taken the form of anagrams, Graecisms, and Latinisations.[4]

Pseudonyms should not be confused with new names that replace old ones and become the individual's full-time name. Pseudonyms are "part-time" names, used only in certain contexts – to provide a more clear-cut separation between one's private and professional lives, to showcase or enhance a particular persona, or to hide an individual's real identity, as with writers' pen names, graffiti artists' tags, resistance fighters' or terrorists' noms de guerre, computer hackers' handles and other online identities for services such as social media, online gaming and internet forums. Actors, voice-over artists, musicians, and other performers sometimes use stage names, for example, to better channel a relevant energy, gain a greater sense of security and comfort via privacy, more easily avoid troublesome fans/"stalkers", or to mask their ethnic backgrounds.

In some cases, pseudonyms are adopted because they are part of a cultural or organisational tradition: for example devotional names used by members of some religious institutes, and "cadre names" used by Communist party leaders such as Trotsky and Lenin.

A collective name or collective pseudonym is one shared by two or more persons, for example the co-authors of a work, such as Carolyn Keene, Erin Hunter, Ellery Queen, Nicolas Bourbaki, or James S. A. Corey.

Etymology

The term pseudonym is derived from the Greek word "ψευδώνυμον" (pseudṓnymon),[5] literally "false name", from ψεῦδος (pseûdos) 'lie, falsehood'[6] and ὄνομα (ónoma) "name".[7] The term alias is a Latin adverb meaning "at another time, elsewhere".[8]

Usage

Name change

Sometimes people change their names in such a manner that the new name becomes permanent and is used by all who know the person. This is not an alias or pseudonym, but in fact a new name. In many countries, including common law countries, a name change can be ratified by a court and become a person's new legal name.

For example, in the 1960s, civil rights campaigner Malcolm X, originally known as Malcolm Little, changed his surname to "X" to represent his unknown African ancestral name that had been lost when his ancestors were brought to North America as slaves. He then changed his name again to Malik El-Shabazz when he converted to Islam.[9]

Likewise some Jews adopted Hebrew family names upon immigrating to Israel, dropping surnames that had been in their families for generations. The politician David Ben-Gurion, for example, was born David Grün in Poland. He adopted his Hebrew name in 1910 when he published his first article in a Zionist journal in Jerusalem.[10]

Concealing identity

Pseudonymous authors may still have their various identities linked together through stylometric analysis of their writing style. The precise degree of this unmasking ability and its ultimate potential is uncertain, but the privacy risks are expected to grow with improved analytic techniques and text corpora. Authors may practice adversarial stylometry to resist such identification.[11]

Business

Businesspersons of ethnic minorities in some parts of the world are sometimes advised by an employer to use a pseudonym that is common or acceptable in that area when conducting business, to overcome racial or religious bias.[12]

Criminal activity

Criminals may use aliases, fictitious business names, and dummy corporations (corporate shells) to hide their identity, or to impersonate other persons or entities in order to commit fraud. Aliases and fictitious business names used for dummy corporations may become so complex that, in the words of The Washington Post, "getting to the truth requires a walk down a bizarre labyrinth" and multiple government agencies may become involved to uncover the truth.[13] Giving a false name to a law enforcement officer is a crime in many jurisdictions; see identity fraud.

Literature

 
A young George Sand (real name "Amantine Lucile Dupin")

A pen name, or nom de plume (French for "pen name"), is a pseudonym (sometimes a particular form of the real name) adopted by an author (or on the author's behalf by their publishers).

Although the term is most frequently used today with regard to identity and the Internet, the concept of pseudonymity has a long history. In ancient literature it was common to write in the name of a famous person, not for concealment or with any intention of deceit; in the New Testament, the second letter of Peter is probably such. A more modern example is all of The Federalist Papers, which were signed by Publius, a pseudonym representing the trio of James Madison, Alexander Hamilton, and John Jay. The papers were written partially in response to several Anti-Federalist Papers, also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern with complete accuracy which of the three authored a few of the papers. There are also examples of modern politicians and high-ranking bureaucrats writing under pseudonyms.[14][15]

Some female authors used male pen names, in particular in the 19th century, when writing was a male-dominated profession. The Brontë sisters used pen names for their early work, so as not to reveal their gender (see below) and so that local residents would not know that the books related to people of the neighbourhood. The Brontës used their neighbours as inspiration for characters in many of their books. Anne Brontë's The Tenant of Wildfell Hall (1848) was published under the name Acton Bell, while Charlotte Brontë used the name Currer Bell for Jane Eyre (1847) and Shirley (1849), and Emily Brontë adopted Ellis Bell as cover for Wuthering Heights (1847). Other examples from the nineteenth-century are the novelist Mary Ann Evans (George Eliot) and the French writer Amandine Aurore Lucile Dupin (George Sand). Pseudonyms may also be used due to cultural or organization or political prejudices.

On the other hand, some 20th- and 21st-century male romance novelists have used female pen names.[16] A few examples are Brindle Chase, Peter O'Donnell (as Madeline Brent), Christopher Wood (as Penny Sutton and Rosie Dixon), and Hugh C. Rae (as Jessica Sterling).[16]

A pen name may be used if a writer's real name is likely to be confused with the name of another writer or notable individual, or if the real name is deemed unsuitable.

Authors who write both fiction and non-fiction, or in different genres, may use different pen names to avoid confusing their readers. For example, the romance writer Nora Roberts writes mystery novels under the name J. D. Robb.

In some cases, an author may become better known by his pen name than his real name. Some famous examples of that include Samuel Clemens, writing as Mark Twain, Theodor Geisel, better known as Dr. Seuss, and Eric Arthur Blair (George Orwell). The British mathematician Charles Dodgson wrote fantasy novels as Lewis Carroll and mathematical treatises under his own name.

Some authors, such as Harold Robbins, use several literary pseudonyms.[17]

Some pen names have been used for long periods, even decades, without the author's true identity being discovered, as with Elena Ferrante and Torsten Krol.

Joanne Rowling[18] published the Harry Potter series as J. K. Rowling. Rowling also published the Cormoran Strike series, a series of detective novels including The Cuckoo's Calling under the pseudonym Robert Galbraith.

Winston Churchill wrote as Winston S. Churchill (from his full surname Spencer Churchill which he did not otherwise use) in an attempt to avoid confusion with an American novelist of the same name. The attempt was not wholly successful – the two are still sometimes confused by booksellers.[19][20]

A pen name may be used specifically to hide the identity of the author, as with exposé books about espionage or crime, or explicit erotic fiction. Erwin von Busse used a pseudonym when he published short stories about sexually charged encounters between men in Germany in 1920.[21] Some prolific authors adopt a pseudonym to disguise the extent of their published output, e. g. Stephen King writing as Richard Bachman. Co-authors may choose to publish under a collective pseudonym, e. g., P. J. Tracy and Perri O'Shaughnessy. Frederic Dannay and Manfred Lee used the name Ellery Queen as a pen name for their collaborative works and as the name of their main character.[22] Asa Earl Carter, a Southern white segregationist affiliated with the KKK, wrote Western books under a fictional Cherokee persona to imply legitimacy and conceal his history.[23]

"Why do authors choose pseudonyms? It is rarely because they actually hope to stay anonymous forever," mused writer and columnist Russell Smith in his review of the Canadian novel Into That Fire by the pseudonymous M. J. Cates.[24]

A famous case in French literature was Romain Gary. Already a well-known writer, he started publishing books as Émile Ajar to test whether his new books would be well received on their own merits, without the aid of his established reputation. They were: Émile Ajar, like Romain Gary before him, was awarded the prestigious Prix Goncourt by a jury unaware that they were the same person. Similarly, TV actor Ronnie Barker submitted comedy material under the name Gerald Wiley.

A collective pseudonym may represent an entire publishing house, or any contributor to a long-running series, especially with juvenile literature. Examples include Watty Piper, Victor Appleton, Erin Hunter, and Kamiru M. Xhan.

Another use of a pseudonym in literature is to present a story as being written by the fictional characters in the story. The series of novels known as A Series of Unfortunate Events are written by Daniel Handler under the pen name of Lemony Snicket, a character in the series. This applies also to some of the several 18th-century English and American writers who used the name Fidelia.

An anonymity pseudonym or multiple-use name is a name used by many different people to protect anonymity.[25] It is a strategy that has been adopted by many unconnected radical groups and by cultural groups, where the construct of personal identity has been criticised. This has led to the idea of the "open pop star".[clarification needed]

Medicine

Pseudonyms and acronyms are often employed in medical research to protect subjects' identities through a process known as de-identification.

Science

Nicolaus Copernicus put forward his theory of heliocentrism in the manuscript Commentariolus anonymously, in part because of his employment as a law clerk for a church-government organization.[26]

Sophie Germain and William Sealy Gosset used pseudonyms to publish their work in the field of mathematics – Germain, to avoid rampant 19th century academic misogyny, and Gosset, to avoid revealing brewing practices of his employer, the Guinness Brewery.[27][28]

Satoshi Nakamoto is a pseudonym of a still unknown author or authors' group behind a white paper about bitcoin.[29][30][31][32]

Military and paramilitary organizations

In Ancien Régime France, a nom de guerre ("war name") would be adopted by each new recruit (or assigned to them by the captain of their company) as they enlisted in the French army. These pseudonyms had an official character and were the predecessor of identification numbers: soldiers were identified by their first names, their family names, and their noms de guerre (e. g. Jean Amarault dit Lafidélité). These pseudonyms were usually related to the soldier's place of origin (e. g. Jean Deslandes dit Champigny, for a soldier coming from a town named Champigny), or to a particular physical or personal trait (e. g. Antoine Bonnet dit Prettaboire, for a soldier prêt à boire, ready to drink). In 1716, a nom de guerre was mandatory for every soldier; officers did not adopt noms de guerre as they considered them derogatory. In daily life, these aliases could replace the real family name.[33]

Noms de guerre were adopted for security reasons by members of World War II French resistance and Polish resistance. Such pseudonyms are often adopted by military special-forces soldiers, such as members of the SAS and similar units of resistance fighters, terrorists, and guerrillas. This practice hides their identities and may protect their families from reprisals; it may also be a form of dissociation from domestic life. Some well-known men who adopted noms de guerre include Carlos, for Ilich Ramírez Sánchez; Willy Brandt, Chancellor of West Germany; and Subcomandante Marcos, spokesman of the Zapatista Army of National Liberation (EZLN).[citation needed] During Lehi's underground fight against the British in Mandatory Palestine, the organization's commander Yitzchak Shamir (later Prime Minister of Israel) adopted the nom de guerre "Michael", in honour of Ireland's Michael Collins. Pseudonym was also stylized as suedonim in a common misspelling of the original word so as to preserve the price of telegrams in World War I and II.

Revolutionaries and resistance leaders, such as Lenin, Stalin, Trotsky, Golda Meir, Philippe Leclerc de Hauteclocque, and Josip Broz Tito, often adopted their noms de guerre as their proper names after the struggle. George Grivas, the Greek-Cypriot EOKA militant, adopted the nom de guerre Digenis (Διγενής). In the French Foreign Legion, recruits can adopt a pseudonym to break with their past lives. Mercenaries have long used "noms de guerre", sometimes even multiple identities, depending on the country, conflict, and circumstance.[citation needed] Some of the most familiar noms de guerre today are the kunya used by Islamic mujahideen. These take the form of a teknonym, either literal or figurative.

Such war names have also been used in Africa. Part of the molding of child soldiers has included giving them such names.[34] They were also used by fighters in the People's Liberation Army of Namibia, with some fighters retaining these names as their permanent names.[35]

Online activity

Individuals using a computer online may adopt or be required to use a form of pseudonym known as a "handle" (a term deriving from CB slang), "user name", "login name", "avatar", or, sometimes, "screen name", "gamertag", "IGN (In Game (Nick)Name)" or "nickname". On the Internet, pseudonymous remailers use cryptography that achieves persistent pseudonymity, so that two-way communication can be achieved, and reputations can be established, without linking physical identities to their respective pseudonyms. Aliasing is the use of multiple names for the same data location.

More sophisticated cryptographic systems, such as anonymous digital credentials, enable users to communicate pseudonymously (i. e., by identifying themselves by means of pseudonyms). In well-defined abuse cases, a designated authority may be able to revoke the pseudonyms and reveal the individuals' real identity.[citation needed]

Use of pseudonyms is common among professional eSports players, despite the fact that many professional games are played on LAN.[36]

Pseudonymity has become an important phenomenon on the Internet and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity,[37] ranging from highly linkable public pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkable non-public pseudonyms (the link is known to system operators but is not publicly disclosed), and unlinkable pseudonyms (the link is not known to system operators and cannot be determined).[38] For example, true anonymous remailer enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunct Penet remailer) are called pseudonymous remailers.

The continuum of unlinkability can also be seen, in part, on Wikipedia. Some registered users make no attempt to disguise their real identities (for example, by placing their real name on their user page). The pseudonym of unregistered users is their IP address, which can, in many cases, easily be linked to them. Other registered users prefer to remain anonymous, and do not disclose identifying information. However, in certain cases, Wikipedia's privacy policy permits system administrators to consult the server logs to determine the IP address, and perhaps the true name, of a registered user. It is possible, in theory, to create an unlinkable Wikipedia pseudonym by using an Open proxy, a Web server that disguises the user's IP address. But most open proxy addresses are blocked indefinitely due to their frequent use by vandals. Additionally, Wikipedia's public record of a user's interest areas, writing style, and argumentative positions may still establish an identifiable pattern.[39][40]

System operators (sysops) at sites offering pseudonymity, such as Wikipedia, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior, are equally unenthusiastic.[41] Still, some users and privacy activists like the American Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (including unintentional disclosures of their personal information and doxing, as discussed in the next section). Their views are supported by laws in some nations (such as Canada) that guarantee citizens a right to speak using a pseudonym.[42] This right does not, however, give citizens the right to demand publication of pseudonymous speech on equipment they do not own.

Confidentiality

Most Web sites that offer pseudonymity retain information about users. These sites are often susceptible to unauthorized intrusions into their non-public database systems. For example, in 2000, a Welsh teenager obtained information about more than 26,000 credit card accounts, including that of Bill Gates.[43][44] In 2003, VISA and MasterCard announced that intruders obtained information about 5.6 million credit cards.[45] Sites that offer pseudonymity are also vulnerable to confidentiality breaches. In a study of a Web dating service and a pseudonymous remailer, University of Cambridge researchers discovered that the systems used by these Web sites to protect user data could be easily compromised, even if the pseudonymous channel is protected by strong encryption. Typically, the protected pseudonymous channel exists within a broader framework in which multiple vulnerabilities exist.[46] Pseudonym users should bear in mind that, given the current state of Web security engineering, their true names may be revealed at any time.

Online reputations

Pseudonymity is an important component of the reputation systems found in online auction services (such as eBay), discussion sites (such as Slashdot), and collaborative knowledge development sites (such as Wikipedia). A pseudonymous user who has acquired a favorable reputation gains the trust of other users. When users believe that they will be rewarded by acquiring a favorable reputation, they are more likely to behave in accordance with the site's policies.[47]

If users can obtain new pseudonymous identities freely or at a very low cost, reputation-based systems are vulnerable to whitewashing attacks,[48] also called serial pseudonymity, in which abusive users continuously discard their old identities and acquire new ones in order to escape the consequences of their behavior: "On the Internet, nobody knows that yesterday you were a dog, and therefore should be in the doghouse today."[49] Users of Internet communities who have been banned only to return with new identities are called sock puppets. Whitewashing is one specific form of Sybil attack on distributed systems.

 
Comment quality on Disqus by type[50][51]

The social cost of cheaply discarded pseudonyms is that experienced users lose confidence in new users,[52] and may subject new users to abuse until they establish a good reputation.[49] System operators may need to remind experienced users that most newcomers are well-intentioned (see, for example, Wikipedia's policy about biting newcomers). Concerns have also been expressed about sock puppets exhausting the supply of easily remembered usernames. In addition a recent research paper demonstrated that people behave in a potentially more aggressive manner when using pseudonyms/nicknames (due to the online disinhibition effect) as opposed to being completely anonymous.[53][54] In contrast, research by the blog comment hosting service Disqus found pseudonymous users contributed the "highest quantity and quality of comments", where "quality" is based on an aggregate of likes, replies, flags, spam reports, and comment deletions,[50][51] and found that users trusted pseudonyms and real names equally.[55]

 
Comment types used on HuffPost using different kinds of anonymity[56]

Researchers at the University of Cambridge showed that pseudonymous comments tended to be more substantive and engaged with other users in explanations, justifications, and chains of argument, and less likely to use insults, than either fully anonymous or real name comments.[56] Proposals have been made to raise the costs of obtaining new identities, such as by charging a small fee or requiring e-mail confirmation. Academic research has proposed cryptographic methods to pseudonymize social media identities[57] or government-issued identities,[58] to accrue and use anonymous reputation in online forums,[59] or to obtain one-per-person and hence less readily-discardable pseudonyms periodically at physical-world pseudonym parties.[60] Others point out that Wikipedia's success is attributable in large measure to its nearly non-existent initial participation costs.

Privacy

People seeking privacy often use pseudonyms to make appointments and reservations.[61] Those writing to advice columns in newspapers and magazines may use pseudonyms.[62] Steve Wozniak used a pseudonym when attending the University of California, Berkeley after co-founding Apple Computer, because "[he] knew [he] wouldn't have time enough to be an A+ student."[63]

Stage names

When used by an actor, musician, radio disc jockey, model, or other performer or "show business" personality a pseudonym is called a stage name, or, occasionally, a professional name, or screen name.

Film, theatre, and related activities

Members of a marginalized ethnic or religious group have often adopted stage names, typically changing their surname or entire name to mask their original background.

Stage names are also used to create a more marketable name, as in the case of Creighton Tull Chaney, who adopted the pseudonym Lon Chaney, Jr., a reference to his famous father Lon Chaney, Sr.

Chris Curtis of Deep Purple fame was christened as Christopher Crummey ("crumby" is UK slang for poor quality). In this and similar cases a stage name is adopted simply to avoid an unfortunate pun.

Pseudonyms are also used to comply with the rules of performing-arts guilds (Screen Actors Guild (SAG), Writers Guild of America, East (WGA), AFTRA, etc.), which do not allow performers to use an existing name, in order to avoid confusion. For example, these rules required film and television actor Michael Fox to add a middle initial and become Michael J. Fox, to avoid being confused with another actor named Michael Fox. This was also true of author and actress Fannie Flagg, who chose this pseudonym; her real name, Patricia Neal, being the name of another well-known actress; and British actor Stewart Granger, whose real name was James Stewart. The film-making team of Joel and Ethan Coen, for instance, share credit for editing under the alias Roderick Jaynes.[64]

Some stage names are used to conceal a person's identity, such as the pseudonym Alan Smithee, which was used by directors in the Directors Guild of America (DGA) to remove their name from a film they feel was edited or modified beyond their artistic satisfaction. In theatre, the pseudonyms George or Georgina Spelvin, and Walter Plinge are used to hide the identity of a performer, usually when he or she is "doubling" (playing more than one role in the same play).

David Agnew was a name used by the BBC to conceal the identity of a scriptwriter, such as for the Doctor Who serial City of Death, which had three writers, including Douglas Adams, who was at the time of writing the show's Script Editor.[65] In another Doctor Who serial, The Brain of Morbius, writer Terrance Dicks demanded the removal of his name from the credits saying it could go out under a "bland pseudonym".[citation needed][66] This ended up as Robin Bland.[66][67]

Music

Musicians and singers can use pseudonyms to allow artists to collaborate with artists on other labels while avoiding the need to gain permission from their own labels, such as the artist Jerry Samuels, who made songs under Napoleon XIV. Rock singer-guitarist George Harrison, for example, played guitar on Cream's song "Badge" using a pseudonym.[68] In classical music, some record companies issued recordings under a nom de disque in the 1950s and 1960s to avoid paying royalties. A number of popular budget LPs of piano music were released under the pseudonym Paul Procopolis.[69] Another example is that Paul McCartney used his fictional name "Bernerd Webb" for Peter and Gordon's song Woman.[70]

Pseudonyms are used as stage names in heavy metal bands, such as Tracii Guns in LA Guns, Axl Rose and Slash in Guns N' Roses, Mick Mars in Mötley Crüe, Dimebag Darrell in Pantera, or C.C. Deville in Poison. Some such names have additional meanings, like that of Brian Hugh Warner, more commonly known as Marilyn Manson: Marilyn coming from Marilyn Monroe and Manson from convicted serial killer Charles Manson. Jacoby Shaddix of Papa Roach went under the name "Coby Dick" during the Infest era. He changed back to his birth name when lovehatetragedy was released.

David Johansen, front man for the hard rock band New York Dolls, recorded and performed pop and lounge music under the pseudonym Buster Poindexter in the late 1980s and early 1990s. The music video for Poindexter's debut single, Hot Hot Hot, opens with a monologue from Johansen where he notes his time with the New York Dolls and explains his desire to create more sophisticated music.

Ross Bagdasarian, Sr., creator of Alvin and the Chipmunks, wrote original songs, arranged, and produced the records under his real name, but performed on them as David Seville. He also wrote songs as Skipper Adams. Danish pop pianist Bent Fabric, whose full name is Bent Fabricius-Bjerre, wrote his biggest instrumental hit "Alley Cat" as Frank Bjorn.

For a time, the musician Prince used an unpronounceable "Love Symbol" as a pseudonym ("Prince" is his actual first name rather than a stage name). He wrote the song "Sugar Walls" for Sheena Easton as "Alexander Nevermind" and "Manic Monday" for The Bangles as "Christopher Tracy". (He also produced albums early in his career as "Jamie Starr").

Many Italian-American singers have used stage names, as their birth names were difficult to pronounce or considered too ethnic for American tastes. Singers changing their names included Dean Martin (born Dino Paul Crocetti), Connie Francis (born Concetta Franconero), Frankie Valli (born Francesco Castelluccio), Tony Bennett (born Anthony Benedetto), and Lady Gaga (born Stefani Germanotta)

In 2009, the British rock band Feeder briefly changed its name to Renegades so it could play a whole show featuring a set list in which 95 per cent of the songs played were from their forthcoming new album of the same name, with none of their singles included. Front man Grant Nicholas felt that if they played as Feeder, there would be uproar over him not playing any of the singles, so used the pseudonym as a hint. A series of small shows were played in 2010, at 250- to 1,000-capacity venues with the plan not to say who the band really are and just announce the shows as if they were a new band.

In many cases, hip-hop and rap artists prefer to use pseudonyms that represents some variation of their name, personality, or interests. Examples include Iggy Azalea (her stage name is a combination of her dog's name, Iggy, and her home street in Mullumbimby, Azalea Street), Ol' Dirty Bastard (known under at least six aliases), Diddy (previously known at various times as Puffy, P. Diddy, and Puff Daddy), Ludacris, Flo Rida (whose stage name is a tribute to his home state, Florida), British-Jamaican hip-hop artist Stefflon Don (real name Stephanie Victoria Allen), LL Cool J, and Chingy. Black metal artists also adopt pseudonyms, usually symbolizing dark values, such as Nocturno Culto, Gaahl, Abbath, and Silenoz. In punk and hardcore punk, singers and band members often replace real names with tougher-sounding stage names such as Sid Vicious (real name John Simon Ritchie) of the late 1970s band Sex Pistols and "Rat" of the early 1980s band The Varukers and the 2000s re-formation of Discharge. The punk rock band The Ramones had every member take the last name of Ramone.[citation needed]

Henry John Deutschendorf Jr., an American singer-songwriter, used the stage name John Denver. The Australian country musician born Robert Lane changed his name to Tex Morton. Reginald Kenneth Dwight legally changed his name in 1972 to Elton John.

See also

Notes

  1. ^ Room (2010, 3).
  2. ^ . Lexico UK English Dictionary. Oxford University Press. Archived from the original on 10 August 2020.
  3. ^ du Pont, George F. (2001) The Criminalization of True Anonymity in Cyberspace 21 February 2006 at the Wayback Machine 7 Mich. Telecomm. Tech. L. Rev.
  4. ^ Peschke (2006, vii).
  5. ^ Harper, Douglas. "pseudonym". Online Etymology Dictionary. Retrieved 2 August 2020.
  6. ^ ψεῦδος, Henry George Liddell, Robert Scott, A Greek-English Lexicon, on Perseus project
  7. ^ ὄνομα 25 February 2021 at the Wayback Machine, Henry George Liddell, Robert Scott, A Greek-English Lexicon, on Perseus project
  8. ^ Cassell's Latin Dictionary, Marchant, J.R.V, & Charles, Joseph F., (Eds.), Revised Edition, 1928
  9. ^ "Biography of Malcolm X, Black Nationalist and Civil Rights Activitist". ThoughtCo.
  10. ^ "Biography David Ben-Gurion: For the Love of Zion". Retrieved 1 June 2017.
  11. ^ Gröndahl & Asokan 2020, p. 16.
  12. ^ Robertson, Nan, The Girls in the Balcony: Women, Men, and The New York Times (N.Y.: Random House, [2nd printing?] 1992 (ISBN 0-394-58452-X)), p. 221. In 1968, one such employer was The New York Times, the affected workers were classified-advertising takers, and the renaming was away from Jewish, Irish, and Italian names to ones "with a WASP flavor".
  13. ^ The Ruse That Roared, The Washington Post, 5 November 1995, Richard Leiby, James Lileks
  14. ^ Gerstein, Josh; Mccaskill, Nolan D. "Obama used a pseudonym in emails with Clinton, FBI documents reveal". POLITICO.
  15. ^ Weaver, Dustin (1 May 2013). "Former EPA chief under fire for new batch of "Richard Windsor" emails". TheHill.
  16. ^ a b Naughton, Julie (1 June 2012). "Yes, Virgil, There Are Men Writing Romance: Focus on Romance 2012". Publishers Weekly. Retrieved 6 May 2014.
  17. ^ Rubin, Harold Francis (1916–) 14 January 2010 at the Wayback Machine, Author Pseudonyms: R. Accessed 27 November 2009.
  18. ^ "J.K. Rowling". c. 2019. Retrieved 5 August 2020.
  19. ^ "Two Winston Churchills". The Age, Hosted on Google News. 19 October 1940. Retrieved 25 October 2013.
  20. ^ Churchill, Winston (11 May 2010). My Early Life - Related Books. ISBN 9781439125069. Retrieved 25 October 2013.
  21. ^ Granand (2022). Berlin Garden of Erotic Delights. Waterbury Press.
  22. ^ "Whodunit?". Ellery Queen, A Website on Deduction. Retrieved 1 May 2022.
  23. ^ Carter, Dan T. (4 October 1991). . The New York Times. Archived from the original on 2 July 2018. Retrieved 18 May 2020.
  24. ^ Smith, Russell (19 February 2019). "Review: Into That Fire is promising in its themes and canvas ...". Globe and Mail.
  25. ^ Home, Stewart (1987). Mind Invaders: A Reader in Psychic Warfare, Cultural Sabotage, and Semiotic Terrorism. Indiana University: Serpent's Tail. p. 119. ISBN 1-85242-560-1.
  26. ^ Oxenham, Simon. "soft question – Pseudonyms of famous mathematicians". MathOverflow. Retrieved 12 January 2020.
  27. ^ Case & Leggett 2005, p. 39.
  28. ^ "soft question – Pseudonyms of famous mathematicians". MathOverflow. Retrieved 12 January 2020.
  29. ^ "The misidentification of Satoshi Nakamoto". theweek.com. 30 June 2015. Retrieved 22 July 2019.
  30. ^ Kharif, Olga (23 April 2019). "John McAfee vows to unmask Crypto's Satoshi Nakamoto, then backs off". Bloomberg.
  31. ^ "Who is Satoshi Nakamoto, Inventor of Bitcoin? It doesn't matter". Fortune. Retrieved 22 July 2019.
  32. ^ Bearman, Sophie (27 October 2017). "Bitcoin's creator may be worth $6 billion – but people still don't know who it is". CNBC. Retrieved 22 July 2019.
  33. ^ . Historica. Archived from the original on 29 December 2010. Retrieved 14 October 2012.
  34. ^ Mastery, D. (2016). "The child soldier narratives and their war names." African Studies Review. 99(2), 166-182.
  35. ^ Nepunda, Lucia. "The significance of Oshiwambo combat names for the People's Liberation Army of Namibia (PLAN) fighters during the armed liberation struggle of Namibia (1966-1989)." PhD diss., University of Namibia, 2020.
  36. ^ Cocke, Taylor (26 November 2013). . Archived from the original on 18 May 2015. Retrieved 14 May 2015.
  37. ^ Froomkin, A. Michael (1995). "Anonymity and Its Enemies (Article 4) 25 May 2008 at the Wayback Machine". Journal of Online Law.
  38. ^ Pfitzmann, A., and M. Köhntopp (2000). "Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology 9 July 2011 at the Wayback Machine". In H. Federrath (ed.), Anonymity (Berlin: Springer-Verlag), pp. 1-9.
  39. ^ Rao, J.R., and P. Rohatgi (2000). "Can Pseudonyms Really Guarantee Privacy?" 21 January 2021 at the Wayback Machine Proceedings of the 9th USENIX Security Symposium (Denver, Colorado, 14–17 Aug. 2000).
  40. ^ Novak, Jasmine; Raghavan, Prabhakar; Tomkins, Andrew (May 2004). "Anti-aliasing on the web". Proceedings of the 13th conference on World Wide Web - WWW '04. WWW '04: Proceedings of the 13th international conference on World Wide Web. New York, New York, USA: ACM Press. pp. 30–39. doi:10.1145/988672.988678. ISBN 9781581138443. OCLC 327018361.
  41. ^ Clarke, Roger (1998). "Technological Aspects of Internet Crime Prevention." 14 August 2008 at the Wayback Machine Paper presented at the Australian Institute for Criminology's Conference on Internet Crime ( 16–17 February 1998).
  42. ^ . 20 April 2001. Archived from the original on 11 December 2006. Retrieved 1 July 2020.
  43. ^ "Teenagers hack Gates's credit card". The Irish Times. 31 March 2000. Retrieved 21 February 2021.
  44. ^ Enos, Lori (27 March 2000). "Welsh Teens Arrested for E-Commerce Hack Attacks". E-Commerce Times. Retrieved 21 February 2021.
  45. ^ Katayama, F. (2003) "Hacker accesses 5.6 Million Credit Cards" CNN.com: Technology (February 18, 2003). 4 March 2016 at the Wayback Machine
  46. ^ Clayton, R.; Danezis, G.; Kuhn, M. (2001). Real World Patterns of Failure in Anonymity Systems (PDF). Lecture Notes in Computer Science. Vol. 2137. pp. 230–244. CiteSeerX 10.1.1.16.7923. doi:10.1007/3-540-45496-9_17. ISBN 978-3-540-42733-9.
  47. ^ Kollock, P. (1999). "The Production of Trust in Online Markets." 26 February 2009 at the Wayback Machine In E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker (eds.), Advances in Group Processes (Greenwich, CT: JAI Press).
  48. ^ Feldman, M., S. Papadimitriou, and J. Chuang (2004). "Free-Riding and Whitewashing in Peer-to-Peer Systems." Paper presented at SIGCOMM '04 Workship (Portland, Oregon, 30 Aug. – 3 September 2004).
  49. ^ a b Friedman, E.; Resnick, P. (2001). (PDF). Journal of Economics and Management Strategy. 10 (2): 173–199. CiteSeerX 10.1.1.30.6376. doi:10.1162/105864001300122476. hdl:2027.42/71559. Archived from the original (PDF) on 23 November 2008.
  50. ^ a b Disqus. . Archived from the original on 16 May 2016. Retrieved 15 June 2016.
  51. ^ a b Rosen, Rebecca J. (11 January 2012). "Real Names Don't Make for Better Commenters, but Pseudonyms Do". The Atlantic. Retrieved 1 July 2020.
  52. ^ Johnson, D.G.; Miller, K. (1998). "Anonymity, Pseudonymity, and Inescapable Identity on the Net". ACM SIGCAS Computers and Society. 28 (2): 37–38. doi:10.1145/276758.276774.
  53. ^ Tsikerdekis, Michail (2011). "Engineering anonymity to reduce aggression online". Proceedings of the IADIS International Conference – Interfaces and Human Computer Interaction. Rome, Italy: IADIS – International association for development of the information society. pp. 500–504.
  54. ^ Tsikerdekis Michail (2012). "The choice of complete anonymity versus pseudonymity for aggression online". EMinds International Journal on Human-Computer Interaction. 2 (8): 35–57.
  55. ^ Roy, Steve (15 December 2014). "What's In A Name? Understanding Pseudonyms". The Disqus Blog. Retrieved 11 July 2020.
  56. ^ a b Fredheim, Rolf; Moore, Alfred (4 November 2015). "Talking Politics Online: How Facebook Generates Clicks But Undermines Discussion". SSRN 2686164. {{cite journal}}: Cite journal requires |journal= (help)
  57. ^ John Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, and Bryan Ford (9 March 2016). Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities (PDF). 6th ACM Conference on Data and Application Security and Privacy (CODASPY). Archived (PDF) from the original on 9 October 2022.{{cite conference}}: CS1 maint: uses authors parameter (link)
  58. ^ Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller (28 September 2020). "CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability" (PDF). Archived (PDF) from the original on 9 October 2022.{{cite web}}: CS1 maint: uses authors parameter (link)
  59. ^ Ennan Zhai, David Isaac Wolinsky, Ruichuan Chen, Ewa Syta, Chao Teng, Bryan Ford (18 March 2016). AnonRep: Towards Tracking-Resistant Anonymous Reputation. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16).{{cite conference}}: CS1 maint: uses authors parameter (link)
  60. ^ Ford, Bryan; Strauss, Jacob (1 April 2008). "An Offline Foundation for Online Accountable Pseudonyms". Proceedings of the 1st workshop on Social network systems - Social Nets '08. 1st Workshop on Social Network Systems – SocialNets '08. pp. 31–6. doi:10.1145/1435497.1435503. ISBN 978-1-60558-124-8.
  61. ^ Ryan, Harriet; Yoshino, Kimi (17 July 2009). "Investigators target Michael Jackson's pseudonyms". Los Angeles Times. Retrieved 14 October 2012.
  62. ^ "Toronto Daily Mail, "Women's Kingdom", "A Delicate Question", April 7, 1883, page 5". Retrieved 14 October 2012.
  63. ^ Stix, Harriet (14 May 1986). "A UC Berkeley Degree Is Now the Apple of Steve Wozniak's Eye". Los Angeles Times. Retrieved 5 January 2015.
  64. ^ "Roderick Jaynes, Imaginary Oscar Nominee for "No Country" – Vulture". Nymag.com. Retrieved 14 October 2012.
  65. ^ "BBC – Doctor Who Classic Episode Guide – City of Death – Details". bbc.co.uk. Retrieved 18 July 2015.
  66. ^ a b Gallagher, William (27 March 2012). . Radio Times. Archived from the original on 27 February 2015. Retrieved 31 March 2013.{{cite web}}: CS1 maint: unfit URL (link)
  67. ^ Howe, Walker and Stammers Doctor Who the Handbook: The Fourth Doctor pp. 175–176.
  68. ^ Winn, John (2009). That Magic Feeling: The Beatles' Recorded Legacy, Volume Two, 1966–1970. Three Rivers Press. p. 229. ISBN 978-0-307-45239-9.
  69. ^ "Saga Remembered by Robin O'Connor - February 2007 MusicWeb-International". www.musicweb-international.com. Retrieved 18 April 2022.
  70. ^ "45cat – Peter And Gordon – Woman / Wrong From The Start – Capitol – USA – 5579". 45cat. Retrieved 30 June 2018.

Sources

  • Gröndahl, Tommi; Asokan, N. (2020). "Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?". ACM Computing Surveys. 52 (3): 1–36. arXiv:1902.08939. doi:10.1145/3310331. S2CID 67856540.
  • Peschke, Michael. 2006. International Encyclopedia of Pseudonyms. Detroit: Gale. ISBN 978-3-598-24960-0.
  • Room, Adrian. 2010. Dictionary of Pseudonyms: 13,000 Assumed Names and Their Origins. 5th rev. ed. Jefferson, N.C.: McFarland & Co. ISBN 978-0-7864-4373-4.

External links

  • A site with pseudonyms for celebrities and entertainers 19 August 2015 at the Wayback Machine
  • Another list of pseudonyms
  • The U.S. copyright status of pseudonyms
  • Anonymity Bibliography Excellent bibliography on anonymity and pseudonymity. Includes hyperlinks.
  • Describes an architecture for anonymous Web browsing.
  • The Real Name Fallacy - "Not only would removing anonymity fail to consistently improve online community behavior – forcing real names in online communities could also increase discrimination and worsen harassment." with 30 references

pseudonym, aliases, redirects, here, other, uses, alias, disambiguation, pseud, redirects, here, columnn, private, list, regular, mini, sections, private, pseuds, corner, pseudonym, from, ancient, greek, ψευδώνυμος, pseudṓnumos, falsely, named, alias, fictitio. Aliases redirects here For other uses see Alias disambiguation Pseud redirects here For the columnn in Private Eye see List of regular mini sections in Private Eye Pseuds Corner A pseudonym ˈ sj uː d e n ɪ m from Ancient Greek pseydwnymos pseudṓnumos falsely named or alias ˈ eɪ l i e s is a fictitious name that a person or group assumes for a particular purpose which differs from their original or true name orthonym 1 2 This also differs from a new name that entirely or legally replaces an individual s own Many pseudonym holders use pseudonyms because they wish to remain anonymous but anonymity is difficult to achieve and often fraught with legal issues 3 Contents 1 Scope 2 Etymology 3 Usage 3 1 Name change 3 2 Concealing identity 3 2 1 Business 3 2 2 Criminal activity 3 2 3 Literature 3 2 4 Medicine 3 2 5 Science 3 2 6 Military and paramilitary organizations 3 2 7 Online activity 3 2 8 Confidentiality 3 2 9 Online reputations 3 2 10 Privacy 3 3 Stage names 3 3 1 Film theatre and related activities 3 3 2 Music 4 See also 5 Notes 6 Sources 7 External linksScope EditThis section needs additional citations for verification Please help improve this article by adding citations to reliable sources in this section Unsourced material may be challenged and removed November 2022 Learn how and when to remove this template message Pseudonyms include stage names user names ring names pen names aliases superhero or villain identities and code names gamer identifications and regnal names of emperors popes and other monarchs In some cases it may also include nicknames Historically they have sometimes taken the form of anagrams Graecisms and Latinisations 4 Pseudonyms should not be confused with new names that replace old ones and become the individual s full time name Pseudonyms are part time names used only in certain contexts to provide a more clear cut separation between one s private and professional lives to showcase or enhance a particular persona or to hide an individual s real identity as with writers pen names graffiti artists tags resistance fighters or terrorists noms de guerre computer hackers handles and other online identities for services such as social media online gaming and internet forums Actors voice over artists musicians and other performers sometimes use stage names for example to better channel a relevant energy gain a greater sense of security and comfort via privacy more easily avoid troublesome fans stalkers or to mask their ethnic backgrounds In some cases pseudonyms are adopted because they are part of a cultural or organisational tradition for example devotional names used by members of some religious institutes and cadre names used by Communist party leaders such as Trotsky and Lenin A collective name or collective pseudonym is one shared by two or more persons for example the co authors of a work such as Carolyn Keene Erin Hunter Ellery Queen Nicolas Bourbaki or James S A Corey Etymology EditThe term pseudonym is derived from the Greek word pseydwnymon pseudṓnymon 5 literally false name from pseῦdos pseudos lie falsehood 6 and ὄnoma onoma name 7 The term alias is a Latin adverb meaning at another time elsewhere 8 Usage EditName change Edit Main article Name change Sometimes people change their names in such a manner that the new name becomes permanent and is used by all who know the person This is not an alias or pseudonym but in fact a new name In many countries including common law countries a name change can be ratified by a court and become a person s new legal name For example in the 1960s civil rights campaigner Malcolm X originally known as Malcolm Little changed his surname to X to represent his unknown African ancestral name that had been lost when his ancestors were brought to North America as slaves He then changed his name again to Malik El Shabazz when he converted to Islam 9 Likewise some Jews adopted Hebrew family names upon immigrating to Israel dropping surnames that had been in their families for generations The politician David Ben Gurion for example was born David Grun in Poland He adopted his Hebrew name in 1910 when he published his first article in a Zionist journal in Jerusalem 10 Concealing identity Edit Pseudonymous authors may still have their various identities linked together through stylometric analysis of their writing style The precise degree of this unmasking ability and its ultimate potential is uncertain but the privacy risks are expected to grow with improved analytic techniques and text corpora Authors may practice adversarial stylometry to resist such identification 11 Business Edit Businesspersons of ethnic minorities in some parts of the world are sometimes advised by an employer to use a pseudonym that is common or acceptable in that area when conducting business to overcome racial or religious bias 12 Criminal activity Edit Criminals may use aliases fictitious business names and dummy corporations corporate shells to hide their identity or to impersonate other persons or entities in order to commit fraud Aliases and fictitious business names used for dummy corporations may become so complex that in the words of The Washington Post getting to the truth requires a walk down a bizarre labyrinth and multiple government agencies may become involved to uncover the truth 13 Giving a false name to a law enforcement officer is a crime in many jurisdictions see identity fraud Literature Edit A young George Sand real name Amantine Lucile Dupin A pen name or nom de plume French for pen name is a pseudonym sometimes a particular form of the real name adopted by an author or on the author s behalf by their publishers Although the term is most frequently used today with regard to identity and the Internet the concept of pseudonymity has a long history In ancient literature it was common to write in the name of a famous person not for concealment or with any intention of deceit in the New Testament the second letter of Peter is probably such A more modern example is all of The Federalist Papers which were signed by Publius a pseudonym representing the trio of James Madison Alexander Hamilton and John Jay The papers were written partially in response to several Anti Federalist Papers also written under pseudonyms As a result of this pseudonymity historians know that the papers were written by Madison Hamilton and Jay but have not been able to discern with complete accuracy which of the three authored a few of the papers There are also examples of modern politicians and high ranking bureaucrats writing under pseudonyms 14 15 Some female authors used male pen names in particular in the 19th century when writing was a male dominated profession The Bronte sisters used pen names for their early work so as not to reveal their gender see below and so that local residents would not know that the books related to people of the neighbourhood The Brontes used their neighbours as inspiration for characters in many of their books Anne Bronte s The Tenant of Wildfell Hall 1848 was published under the name Acton Bell while Charlotte Bronte used the name Currer Bell for Jane Eyre 1847 and Shirley 1849 and Emily Bronte adopted Ellis Bell as cover for Wuthering Heights 1847 Other examples from the nineteenth century are the novelist Mary Ann Evans George Eliot and the French writer Amandine Aurore Lucile Dupin George Sand Pseudonyms may also be used due to cultural or organization or political prejudices On the other hand some 20th and 21st century male romance novelists have used female pen names 16 A few examples are Brindle Chase Peter O Donnell as Madeline Brent Christopher Wood as Penny Sutton and Rosie Dixon and Hugh C Rae as Jessica Sterling 16 A pen name may be used if a writer s real name is likely to be confused with the name of another writer or notable individual or if the real name is deemed unsuitable Authors who write both fiction and non fiction or in different genres may use different pen names to avoid confusing their readers For example the romance writer Nora Roberts writes mystery novels under the name J D Robb In some cases an author may become better known by his pen name than his real name Some famous examples of that include Samuel Clemens writing as Mark Twain Theodor Geisel better known as Dr Seuss and Eric Arthur Blair George Orwell The British mathematician Charles Dodgson wrote fantasy novels as Lewis Carroll and mathematical treatises under his own name Some authors such as Harold Robbins use several literary pseudonyms 17 Some pen names have been used for long periods even decades without the author s true identity being discovered as with Elena Ferrante and Torsten Krol Joanne Rowling 18 published the Harry Potter series as J K Rowling Rowling also published the Cormoran Strike series a series of detective novels including The Cuckoo s Calling under the pseudonym Robert Galbraith Winston Churchill wrote as Winston S Churchill from his full surname Spencer Churchill which he did not otherwise use in an attempt to avoid confusion with an American novelist of the same name The attempt was not wholly successful the two are still sometimes confused by booksellers 19 20 A pen name may be used specifically to hide the identity of the author as with expose books about espionage or crime or explicit erotic fiction Erwin von Busse used a pseudonym when he published short stories about sexually charged encounters between men in Germany in 1920 21 Some prolific authors adopt a pseudonym to disguise the extent of their published output e g Stephen King writing as Richard Bachman Co authors may choose to publish under a collective pseudonym e g P J Tracy and Perri O Shaughnessy Frederic Dannay and Manfred Lee used the name Ellery Queen as a pen name for their collaborative works and as the name of their main character 22 Asa Earl Carter a Southern white segregationist affiliated with the KKK wrote Western books under a fictional Cherokee persona to imply legitimacy and conceal his history 23 Why do authors choose pseudonyms It is rarely because they actually hope to stay anonymous forever mused writer and columnist Russell Smith in his review of the Canadian novel Into That Fire by the pseudonymous M J Cates 24 A famous case in French literature was Romain Gary Already a well known writer he started publishing books as Emile Ajar to test whether his new books would be well received on their own merits without the aid of his established reputation They were Emile Ajar like Romain Gary before him was awarded the prestigious Prix Goncourt by a jury unaware that they were the same person Similarly TV actor Ronnie Barker submitted comedy material under the name Gerald Wiley A collective pseudonym may represent an entire publishing house or any contributor to a long running series especially with juvenile literature Examples include Watty Piper Victor Appleton Erin Hunter and Kamiru M Xhan Another use of a pseudonym in literature is to present a story as being written by the fictional characters in the story The series of novels known as A Series of Unfortunate Events are written by Daniel Handler under the pen name of Lemony Snicket a character in the series This applies also to some of the several 18th century English and American writers who used the name Fidelia An anonymity pseudonym or multiple use name is a name used by many different people to protect anonymity 25 It is a strategy that has been adopted by many unconnected radical groups and by cultural groups where the construct of personal identity has been criticised This has led to the idea of the open pop star clarification needed Medicine Edit Pseudonyms and acronyms are often employed in medical research to protect subjects identities through a process known as de identification Science Edit Further information Academic authorship Anonymous and unclaimed authorship Nicolaus Copernicus put forward his theory of heliocentrism in the manuscript Commentariolus anonymously in part because of his employment as a law clerk for a church government organization 26 Sophie Germain and William Sealy Gosset used pseudonyms to publish their work in the field of mathematics Germain to avoid rampant 19th century academic misogyny and Gosset to avoid revealing brewing practices of his employer the Guinness Brewery 27 28 Satoshi Nakamoto is a pseudonym of a still unknown author or authors group behind a white paper about bitcoin 29 30 31 32 Military and paramilitary organizations Edit This section needs additional citations for verification Please help improve this article by adding citations to reliable sources in this section Unsourced material may be challenged and removed September 2016 Learn how and when to remove this template message In Ancien Regime France a nom de guerre war name would be adopted by each new recruit or assigned to them by the captain of their company as they enlisted in the French army These pseudonyms had an official character and were the predecessor of identification numbers soldiers were identified by their first names their family names and their noms de guerre e g Jean Amarault dit Lafidelite These pseudonyms were usually related to the soldier s place of origin e g Jean Deslandes dit Champigny for a soldier coming from a town named Champigny or to a particular physical or personal trait e g Antoine Bonnet dit Prettaboire for a soldier pret a boire ready to drink In 1716 a nom de guerre was mandatory for every soldier officers did not adopt noms de guerre as they considered them derogatory In daily life these aliases could replace the real family name 33 Noms de guerre were adopted for security reasons by members of World War II French resistance and Polish resistance Such pseudonyms are often adopted by military special forces soldiers such as members of the SAS and similar units of resistance fighters terrorists and guerrillas This practice hides their identities and may protect their families from reprisals it may also be a form of dissociation from domestic life Some well known men who adopted noms de guerre include Carlos for Ilich Ramirez Sanchez Willy Brandt Chancellor of West Germany and Subcomandante Marcos spokesman of the Zapatista Army of National Liberation EZLN citation needed During Lehi s underground fight against the British in Mandatory Palestine the organization s commander Yitzchak Shamir later Prime Minister of Israel adopted the nom de guerre Michael in honour of Ireland s Michael Collins Pseudonym was also stylized as suedonim in a common misspelling of the original word so as to preserve the price of telegrams in World War I and II Revolutionaries and resistance leaders such as Lenin Stalin Trotsky Golda Meir Philippe Leclerc de Hauteclocque and Josip Broz Tito often adopted their noms de guerre as their proper names after the struggle George Grivas the Greek Cypriot EOKA militant adopted the nom de guerre Digenis Digenhs In the French Foreign Legion recruits can adopt a pseudonym to break with their past lives Mercenaries have long used noms de guerre sometimes even multiple identities depending on the country conflict and circumstance citation needed Some of the most familiar noms de guerre today are the kunya used by Islamic mujahideen These take the form of a teknonym either literal or figurative Such war names have also been used in Africa Part of the molding of child soldiers has included giving them such names 34 They were also used by fighters in the People s Liberation Army of Namibia with some fighters retaining these names as their permanent names 35 Online activity Edit Individuals using a computer online may adopt or be required to use a form of pseudonym known as a handle a term deriving from CB slang user name login name avatar or sometimes screen name gamertag IGN In Game Nick Name or nickname On the Internet pseudonymous remailers use cryptography that achieves persistent pseudonymity so that two way communication can be achieved and reputations can be established without linking physical identities to their respective pseudonyms Aliasing is the use of multiple names for the same data location More sophisticated cryptographic systems such as anonymous digital credentials enable users to communicate pseudonymously i e by identifying themselves by means of pseudonyms In well defined abuse cases a designated authority may be able to revoke the pseudonyms and reveal the individuals real identity citation needed Use of pseudonyms is common among professional eSports players despite the fact that many professional games are played on LAN 36 Pseudonymity has become an important phenomenon on the Internet and other computer networks In computer networks pseudonyms possess varying degrees of anonymity 37 ranging from highly linkable public pseudonyms the link between the pseudonym and a human being is publicly known or easy to discover potentially linkable non public pseudonyms the link is known to system operators but is not publicly disclosed and unlinkable pseudonyms the link is not known to system operators and cannot be determined 38 For example true anonymous remailer enables Internet users to establish unlinkable pseudonyms those that employ non public pseudonyms such as the now defunct Penet remailer are called pseudonymous remailers The continuum of unlinkability can also be seen in part on Wikipedia Some registered users make no attempt to disguise their real identities for example by placing their real name on their user page The pseudonym of unregistered users is their IP address which can in many cases easily be linked to them Other registered users prefer to remain anonymous and do not disclose identifying information However in certain cases Wikipedia s privacy policy permits system administrators to consult the server logs to determine the IP address and perhaps the true name of a registered user It is possible in theory to create an unlinkable Wikipedia pseudonym by using an Open proxy a Web server that disguises the user s IP address But most open proxy addresses are blocked indefinitely due to their frequent use by vandals Additionally Wikipedia s public record of a user s interest areas writing style and argumentative positions may still establish an identifiable pattern 39 40 System operators sysops at sites offering pseudonymity such as Wikipedia are not likely to build unlinkability into their systems as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors Law enforcement personnel fearing an avalanche of illegal behavior are equally unenthusiastic 41 Still some users and privacy activists like the American Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft illegal government surveillance stalking and other unwelcome consequences of Internet use including unintentional disclosures of their personal information and doxing as discussed in the next section Their views are supported by laws in some nations such as Canada that guarantee citizens a right to speak using a pseudonym 42 This right does not however give citizens the right to demand publication of pseudonymous speech on equipment they do not own Confidentiality Edit Most Web sites that offer pseudonymity retain information about users These sites are often susceptible to unauthorized intrusions into their non public database systems For example in 2000 a Welsh teenager obtained information about more than 26 000 credit card accounts including that of Bill Gates 43 44 In 2003 VISA and MasterCard announced that intruders obtained information about 5 6 million credit cards 45 Sites that offer pseudonymity are also vulnerable to confidentiality breaches In a study of a Web dating service and a pseudonymous remailer University of Cambridge researchers discovered that the systems used by these Web sites to protect user data could be easily compromised even if the pseudonymous channel is protected by strong encryption Typically the protected pseudonymous channel exists within a broader framework in which multiple vulnerabilities exist 46 Pseudonym users should bear in mind that given the current state of Web security engineering their true names may be revealed at any time Online reputations Edit Pseudonymity is an important component of the reputation systems found in online auction services such as eBay discussion sites such as Slashdot and collaborative knowledge development sites such as Wikipedia A pseudonymous user who has acquired a favorable reputation gains the trust of other users When users believe that they will be rewarded by acquiring a favorable reputation they are more likely to behave in accordance with the site s policies 47 If users can obtain new pseudonymous identities freely or at a very low cost reputation based systems are vulnerable to whitewashing attacks 48 also called serial pseudonymity in which abusive users continuously discard their old identities and acquire new ones in order to escape the consequences of their behavior On the Internet nobody knows that yesterday you were a dog and therefore should be in the doghouse today 49 Users of Internet communities who have been banned only to return with new identities are called sock puppets Whitewashing is one specific form of Sybil attack on distributed systems Comment quality on Disqus by type 50 51 The social cost of cheaply discarded pseudonyms is that experienced users lose confidence in new users 52 and may subject new users to abuse until they establish a good reputation 49 System operators may need to remind experienced users that most newcomers are well intentioned see for example Wikipedia s policy about biting newcomers Concerns have also been expressed about sock puppets exhausting the supply of easily remembered usernames In addition a recent research paper demonstrated that people behave in a potentially more aggressive manner when using pseudonyms nicknames due to the online disinhibition effect as opposed to being completely anonymous 53 54 In contrast research by the blog comment hosting service Disqus found pseudonymous users contributed the highest quantity and quality of comments where quality is based on an aggregate of likes replies flags spam reports and comment deletions 50 51 and found that users trusted pseudonyms and real names equally 55 Comment types used on HuffPost using different kinds of anonymity 56 Researchers at the University of Cambridge showed that pseudonymous comments tended to be more substantive and engaged with other users in explanations justifications and chains of argument and less likely to use insults than either fully anonymous or real name comments 56 Proposals have been made to raise the costs of obtaining new identities such as by charging a small fee or requiring e mail confirmation Academic research has proposed cryptographic methods to pseudonymize social media identities 57 or government issued identities 58 to accrue and use anonymous reputation in online forums 59 or to obtain one per person and hence less readily discardable pseudonyms periodically at physical world pseudonym parties 60 Others point out that Wikipedia s success is attributable in large measure to its nearly non existent initial participation costs Privacy Edit People seeking privacy often use pseudonyms to make appointments and reservations 61 Those writing to advice columns in newspapers and magazines may use pseudonyms 62 Steve Wozniak used a pseudonym when attending the University of California Berkeley after co founding Apple Computer because he knew he wouldn t have time enough to be an A student 63 Stage names Edit Main article Stage name When used by an actor musician radio disc jockey model or other performer or show business personality a pseudonym is called a stage name or occasionally a professional name or screen name Film theatre and related activities Edit Members of a marginalized ethnic or religious group have often adopted stage names typically changing their surname or entire name to mask their original background Stage names are also used to create a more marketable name as in the case of Creighton Tull Chaney who adopted the pseudonym Lon Chaney Jr a reference to his famous father Lon Chaney Sr Chris Curtis of Deep Purple fame was christened as Christopher Crummey crumby is UK slang for poor quality In this and similar cases a stage name is adopted simply to avoid an unfortunate pun Pseudonyms are also used to comply with the rules of performing arts guilds Screen Actors Guild SAG Writers Guild of America East WGA AFTRA etc which do not allow performers to use an existing name in order to avoid confusion For example these rules required film and television actor Michael Fox to add a middle initial and become Michael J Fox to avoid being confused with another actor named Michael Fox This was also true of author and actress Fannie Flagg who chose this pseudonym her real name Patricia Neal being the name of another well known actress and British actor Stewart Granger whose real name was James Stewart The film making team of Joel and Ethan Coen for instance share credit for editing under the alias Roderick Jaynes 64 Some stage names are used to conceal a person s identity such as the pseudonym Alan Smithee which was used by directors in the Directors Guild of America DGA to remove their name from a film they feel was edited or modified beyond their artistic satisfaction In theatre the pseudonyms George or Georgina Spelvin and Walter Plinge are used to hide the identity of a performer usually when he or she is doubling playing more than one role in the same play David Agnew was a name used by the BBC to conceal the identity of a scriptwriter such as for the Doctor Who serial City of Death which had three writers including Douglas Adams who was at the time of writing the show s Script Editor 65 In another Doctor Who serial The Brain of Morbius writer Terrance Dicks demanded the removal of his name from the credits saying it could go out under a bland pseudonym citation needed 66 This ended up as Robin Bland 66 67 Music Edit This section needs additional citations for verification Please help improve this article by adding citations to reliable sources in this section Unsourced material may be challenged and removed Find sources Pseudonym news newspapers books scholar JSTOR September 2018 Learn how and when to remove this template message Musicians and singers can use pseudonyms to allow artists to collaborate with artists on other labels while avoiding the need to gain permission from their own labels such as the artist Jerry Samuels who made songs under Napoleon XIV Rock singer guitarist George Harrison for example played guitar on Cream s song Badge using a pseudonym 68 In classical music some record companies issued recordings under a nom de disque in the 1950s and 1960s to avoid paying royalties A number of popular budget LPs of piano music were released under the pseudonym Paul Procopolis 69 Another example is that Paul McCartney used his fictional name Bernerd Webb for Peter and Gordon s song Woman 70 Pseudonyms are used as stage names in heavy metal bands such as Tracii Guns in LA Guns Axl Rose and Slash in Guns N Roses Mick Mars in Motley Crue Dimebag Darrell in Pantera or C C Deville in Poison Some such names have additional meanings like that of Brian Hugh Warner more commonly known as Marilyn Manson Marilyn coming from Marilyn Monroe and Manson from convicted serial killer Charles Manson Jacoby Shaddix of Papa Roach went under the name Coby Dick during the Infest era He changed back to his birth name when lovehatetragedy was released David Johansen front man for the hard rock band New York Dolls recorded and performed pop and lounge music under the pseudonym Buster Poindexter in the late 1980s and early 1990s The music video for Poindexter s debut single Hot Hot Hot opens with a monologue from Johansen where he notes his time with the New York Dolls and explains his desire to create more sophisticated music Ross Bagdasarian Sr creator of Alvin and the Chipmunks wrote original songs arranged and produced the records under his real name but performed on them as David Seville He also wrote songs as Skipper Adams Danish pop pianist Bent Fabric whose full name is Bent Fabricius Bjerre wrote his biggest instrumental hit Alley Cat as Frank Bjorn For a time the musician Prince used an unpronounceable Love Symbol as a pseudonym Prince is his actual first name rather than a stage name He wrote the song Sugar Walls for Sheena Easton as Alexander Nevermind and Manic Monday for The Bangles as Christopher Tracy He also produced albums early in his career as Jamie Starr Many Italian American singers have used stage names as their birth names were difficult to pronounce or considered too ethnic for American tastes Singers changing their names included Dean Martin born Dino Paul Crocetti Connie Francis born Concetta Franconero Frankie Valli born Francesco Castelluccio Tony Bennett born Anthony Benedetto and Lady Gaga born Stefani Germanotta In 2009 the British rock band Feeder briefly changed its name to Renegades so it could play a whole show featuring a set list in which 95 per cent of the songs played were from their forthcoming new album of the same name with none of their singles included Front man Grant Nicholas felt that if they played as Feeder there would be uproar over him not playing any of the singles so used the pseudonym as a hint A series of small shows were played in 2010 at 250 to 1 000 capacity venues with the plan not to say who the band really are and just announce the shows as if they were a new band In many cases hip hop and rap artists prefer to use pseudonyms that represents some variation of their name personality or interests Examples include Iggy Azalea her stage name is a combination of her dog s name Iggy and her home street in Mullumbimby Azalea Street Ol Dirty Bastard known under at least six aliases Diddy previously known at various times as Puffy P Diddy and Puff Daddy Ludacris Flo Rida whose stage name is a tribute to his home state Florida British Jamaican hip hop artist Stefflon Don real name Stephanie Victoria Allen LL Cool J and Chingy Black metal artists also adopt pseudonyms usually symbolizing dark values such as Nocturno Culto Gaahl Abbath and Silenoz In punk and hardcore punk singers and band members often replace real names with tougher sounding stage names such as Sid Vicious real name John Simon Ritchie of the late 1970s band Sex Pistols and Rat of the early 1980s band The Varukers and the 2000s re formation of Discharge The punk rock band The Ramones had every member take the last name of Ramone citation needed Henry John Deutschendorf Jr an American singer songwriter used the stage name John Denver The Australian country musician born Robert Lane changed his name to Tex Morton Reginald Kenneth Dwight legally changed his name in 1972 to Elton John See also EditAlter ego Anonymity Anonymous post Anonymous remailer Bugō Courtesy name Code name Confidentiality Data haven Digital signature Friend to friend Heteronym Hypocorism John Doe List of Latinised names List of placeholder names by language List of pseudonyms List of pseudonyms used in the American Constitutional debates List of stage names Mononymous person Nickname Nym server Nymwars Onion routing Penet fi Placeholder name Placeholder names in cryptography Pseudepigrapha Pseudonymization Pseudonymous Bosch Pseudonymous remailer Public key encryption Ring name Secret identityNotes Edit Room 2010 3 pseudonym Lexico UK English Dictionary Oxford University Press Archived from the original on 10 August 2020 du Pont George F 2001 The Criminalization of True Anonymity in Cyberspace Archived 21 February 2006 at the Wayback Machine 7 Mich Telecomm Tech L Rev Peschke 2006 vii Harper Douglas pseudonym Online Etymology Dictionary Retrieved 2 August 2020 pseῦdos Henry George Liddell Robert Scott A Greek English Lexicon on Perseus project ὄnoma Archived 25 February 2021 at the Wayback Machine Henry George Liddell Robert Scott A Greek English Lexicon on Perseus project Cassell s Latin Dictionary Marchant J R V amp Charles Joseph F Eds Revised Edition 1928 Biography of Malcolm X Black Nationalist and Civil Rights Activitist ThoughtCo Biography David Ben Gurion For the Love of Zion Retrieved 1 June 2017 Grondahl amp Asokan 2020 p 16 Robertson Nan The Girls in the Balcony Women Men andThe New York Times N Y Random House 2nd printing 1992 ISBN 0 394 58452 X p 221 In 1968 one such employer was The New York Times the affected workers were classified advertising takers and the renaming was away from Jewish Irish and Italian names to ones with a WASP flavor The Ruse That Roared The Washington Post 5 November 1995 Richard Leiby James Lileks Gerstein Josh Mccaskill Nolan D Obama used a pseudonym in emails with Clinton FBI documents reveal POLITICO Weaver Dustin 1 May 2013 Former EPA chief under fire for new batch of Richard Windsor emails TheHill a b Naughton Julie 1 June 2012 Yes Virgil There Are Men Writing Romance Focus on Romance 2012 Publishers Weekly Retrieved 6 May 2014 Rubin Harold Francis 1916 Archived 14 January 2010 at the Wayback Machine Author Pseudonyms R Accessed 27 November 2009 J K Rowling c 2019 Retrieved 5 August 2020 Two Winston Churchills The Age Hosted on Google News 19 October 1940 Retrieved 25 October 2013 Churchill Winston 11 May 2010 My Early Life Related Books ISBN 9781439125069 Retrieved 25 October 2013 Granand 2022 Berlin Garden of Erotic Delights Waterbury Press Whodunit Ellery Queen A Website on Deduction Retrieved 1 May 2022 Carter Dan T 4 October 1991 The Transformation of a Klansman The New York Times Archived from the original on 2 July 2018 Retrieved 18 May 2020 Smith Russell 19 February 2019 Review Into That Fire is promising in its themes and canvas Globe and Mail Home Stewart 1987 Mind Invaders A Reader in Psychic Warfare Cultural Sabotage and Semiotic Terrorism Indiana University Serpent s Tail p 119 ISBN 1 85242 560 1 Oxenham Simon soft question Pseudonyms of famous mathematicians MathOverflow Retrieved 12 January 2020 Case amp Leggett 2005 p 39 sfn error no target CITEREFCaseLeggett2005 help soft question Pseudonyms of famous mathematicians MathOverflow Retrieved 12 January 2020 The misidentification of Satoshi Nakamoto theweek com 30 June 2015 Retrieved 22 July 2019 Kharif Olga 23 April 2019 John McAfee vows to unmask Crypto s Satoshi Nakamoto then backs off Bloomberg Who is Satoshi Nakamoto Inventor of Bitcoin It doesn t matter Fortune Retrieved 22 July 2019 Bearman Sophie 27 October 2017 Bitcoin s creator may be worth 6 billion but people still don t know who it is CNBC Retrieved 22 July 2019 Home Historica Dominion Historica Archived from the original on 29 December 2010 Retrieved 14 October 2012 Mastery D 2016 The child soldier narratives and their war names African Studies Review 99 2 166 182 Nepunda Lucia The significance of Oshiwambo combat names for the People s Liberation Army of Namibia PLAN fighters during the armed liberation struggle of Namibia 1966 1989 PhD diss University of Namibia 2020 Cocke Taylor 26 November 2013 Why esports needs to ditch online aliases Archived from the original on 18 May 2015 Retrieved 14 May 2015 Froomkin A Michael 1995 Anonymity and Its Enemies Article 4 Archived 25 May 2008 at the Wayback Machine Journal of Online Law Pfitzmann A and M Kohntopp 2000 Anonymity Unobservability and Pseudonymity A Proposal for Terminology Archived 9 July 2011 at the Wayback Machine In H Federrath ed Anonymity Berlin Springer Verlag pp 1 9 Rao J R and P Rohatgi 2000 Can Pseudonyms Really Guarantee Privacy Archived 21 January 2021 at the Wayback Machine Proceedings of the 9th USENIX Security Symposium Denver Colorado 14 17 Aug 2000 Novak Jasmine Raghavan Prabhakar Tomkins Andrew May 2004 Anti aliasing on the web Proceedings of the 13th conference on World Wide Web WWW 04 WWW 04 Proceedings of the 13th international conference on World Wide Web New York New York USA ACM Press pp 30 39 doi 10 1145 988672 988678 ISBN 9781581138443 OCLC 327018361 Clarke Roger 1998 Technological Aspects of Internet Crime Prevention Archived 14 August 2008 at the Wayback Machine Paper presented at the Australian Institute for Criminology s Conference on Internet Crime 16 17 February 1998 EFF Press Release Federal Court Upholds Online Anonymous Speech in 2TheMart com case 20 April 2001 Archived from the original on 11 December 2006 Retrieved 1 July 2020 Teenagers hack Gates s credit card The Irish Times 31 March 2000 Retrieved 21 February 2021 Enos Lori 27 March 2000 Welsh Teens Arrested for E Commerce Hack Attacks E Commerce Times Retrieved 21 February 2021 Katayama F 2003 Hacker accesses 5 6 Million Credit Cards CNN com Technology February 18 2003 Archived 4 March 2016 at the Wayback Machine Clayton R Danezis G Kuhn M 2001 Real World Patterns of Failure in Anonymity Systems PDF Lecture Notes in Computer Science Vol 2137 pp 230 244 CiteSeerX 10 1 1 16 7923 doi 10 1007 3 540 45496 9 17 ISBN 978 3 540 42733 9 Kollock P 1999 The Production of Trust in Online Markets Archived 26 February 2009 at the Wayback Machine In E J Lawler M Macy S Thyne and H A Walker eds Advances in Group Processes Greenwich CT JAI Press Feldman M S Papadimitriou and J Chuang 2004 Free Riding and Whitewashing in Peer to Peer Systems Paper presented at SIGCOMM 04 Workship Portland Oregon 30 Aug 3 September 2004 a b Friedman E Resnick P 2001 The Social Cost of Cheap Pseudonyms PDF Journal of Economics and Management Strategy 10 2 173 199 CiteSeerX 10 1 1 30 6376 doi 10 1162 105864001300122476 hdl 2027 42 71559 Archived from the original PDF on 23 November 2008 a b Disqus Pseudonyms drive communities Archived from the original on 16 May 2016 Retrieved 15 June 2016 a b Rosen Rebecca J 11 January 2012 Real Names Don t Make for Better Commenters but Pseudonyms Do The Atlantic Retrieved 1 July 2020 Johnson D G Miller K 1998 Anonymity Pseudonymity and Inescapable Identity on the Net ACM SIGCAS Computers and Society 28 2 37 38 doi 10 1145 276758 276774 Tsikerdekis Michail 2011 Engineering anonymity to reduce aggression online Proceedings of the IADIS International Conference Interfaces and Human Computer Interaction Rome Italy IADIS International association for development of the information society pp 500 504 Tsikerdekis Michail 2012 The choice of complete anonymity versus pseudonymity for aggression online EMinds International Journal on Human Computer Interaction 2 8 35 57 Roy Steve 15 December 2014 What s In A Name Understanding Pseudonyms The Disqus Blog Retrieved 11 July 2020 a b Fredheim Rolf Moore Alfred 4 November 2015 Talking Politics Online How Facebook Generates Clicks But Undermines Discussion SSRN 2686164 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help John Maheswaran Daniel Jackowitz Ennan Zhai David Isaac Wolinsky and Bryan Ford 9 March 2016 Building Privacy Preserving Cryptographic Credentials from Federated Online Identities PDF 6th ACM Conference on Data and Application Security and Privacy CODASPY Archived PDF from the original on 9 October 2022 a href Template Cite conference html title Template Cite conference cite conference a CS1 maint uses authors parameter link Deepak Maram Harjasleen Malvai Fan Zhang Nerla Jean Louis Alexander Frolov Tyler Kell Tyrone Lobban Christine Moy Ari Juels Andrew Miller 28 September 2020 CanDID Can Do Decentralized Identity with Legacy Compatibility Sybil Resistance and Accountability PDF Archived PDF from the original on 9 October 2022 a href Template Cite web html title Template Cite web cite web a CS1 maint uses authors parameter link Ennan Zhai David Isaac Wolinsky Ruichuan Chen Ewa Syta Chao Teng Bryan Ford 18 March 2016 AnonRep Towards Tracking Resistant Anonymous Reputation 13th USENIX Symposium on Networked Systems Design and Implementation NSDI 16 a href Template Cite conference html title Template Cite conference cite conference a CS1 maint uses authors parameter link Ford Bryan Strauss Jacob 1 April 2008 An Offline Foundation for Online Accountable Pseudonyms Proceedings of the 1st workshop on Social network systems SocialNets 08 1st Workshop on Social Network Systems SocialNets 08 pp 31 6 doi 10 1145 1435497 1435503 ISBN 978 1 60558 124 8 Ryan Harriet Yoshino Kimi 17 July 2009 Investigators target Michael Jackson s pseudonyms Los Angeles Times Retrieved 14 October 2012 Toronto Daily Mail Women s Kingdom A Delicate Question April 7 1883 page 5 Retrieved 14 October 2012 Stix Harriet 14 May 1986 A UC Berkeley Degree Is Now the Apple of Steve Wozniak s Eye Los Angeles Times Retrieved 5 January 2015 Roderick Jaynes Imaginary Oscar Nominee for No Country Vulture Nymag com Retrieved 14 October 2012 BBC Doctor Who Classic Episode Guide City of Death Details bbc co uk Retrieved 18 July 2015 a b Gallagher William 27 March 2012 Doctor Who s secret history of codenames revealed Radio Times Archived from the original on 27 February 2015 Retrieved 31 March 2013 a href Template Cite web html title Template Cite web cite web a CS1 maint unfit URL link Howe Walker and Stammers Doctor Who the Handbook The Fourth Doctor pp 175 176 Winn John 2009 That Magic Feeling The Beatles Recorded Legacy Volume Two 1966 1970 Three Rivers Press p 229 ISBN 978 0 307 45239 9 Saga Remembered by Robin O Connor February 2007 MusicWeb International www musicweb international com Retrieved 18 April 2022 45cat Peter And Gordon Woman Wrong From The Start Capitol USA 5579 45cat Retrieved 30 June 2018 Sources EditGrondahl Tommi Asokan N 2020 Text Analysis in Adversarial Settings Does Deception Leave a Stylistic Trace ACM Computing Surveys 52 3 1 36 arXiv 1902 08939 doi 10 1145 3310331 S2CID 67856540 Peschke Michael 2006 International Encyclopedia of Pseudonyms Detroit Gale ISBN 978 3 598 24960 0 Room Adrian 2010 Dictionary of Pseudonyms 13 000 Assumed Names and Their Origins 5th rev ed Jefferson N C McFarland amp Co ISBN 978 0 7864 4373 4 External links Edit Look up pseudonym in Wiktionary the free dictionary Wikisource has the text of the 1911 Encyclopaedia Britannica article Pseudonym A site with pseudonyms for celebrities and entertainers Archived 19 August 2015 at the Wayback Machine Another list of pseudonyms The U S copyright status of pseudonyms Anonymity Bibliography Excellent bibliography on anonymity and pseudonymity Includes hyperlinks Anonymity Network Describes an architecture for anonymous Web browsing Electronic Frontier Foundation EFF Anonymity Pseudonymity Archive The Real Name Fallacy Not only would removing anonymity fail to consistently improve online community behavior forcing real names in online communities could also increase discrimination and worsen harassment with 30 references Retrieved from https en wikipedia org w index php title Pseudonym amp oldid 1153885564, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.