✪✪✪✪✪ http://www.theaudiopedia.com ✪✪✪✪✪
What is PSEUDONYMITY? What does PSEUDONYMITY mean? PSEUDONYMITY meaning - PSEUDONYMITY pronunciation - PSEUDONYMITY definition - PSEUDONYMITY explanation - Hos to pronounce PSEUDONYMITY?
Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license.
SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ
Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names (that is, legal identities). Most pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve, and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.
Although the term is most frequently used today with regard to identity and the Internet, the concept of pseudonymity has a long history. In ancient literature it was common to write in the name of a famous person, not for concealment or with any intention of deceit; in the New Testament, the second letter of Peter is probably such. A more modern example is all of The Federalist Papers, which were signed by Publius, a pseudonym representing the trio of James Madison, Alexander Hamilton, and John Jay. The papers were written partially in response to several Anti-Federalist Papers, also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern with complete accuracy which of the three authored a few of the papers.
Pseudonymity has become an important phenomenon on the Internet and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity, ranging from highly linkable public pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkable non-public pseudonyms (the link is known to system operators but is not publicly disclosed), and unlinkable pseudonyms (the link is not known to system operators and cannot be determined). For example, true anonymous remailer enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunct Penet remailer) are called pseudonymous remailers.
System operators (sysops) at sites offering pseudonymity, such as Wikipedia, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior are equally unenthusiastic. Still, some users and privacy activists like the American Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (including unintentional disclosures of their personal information, as discussed in the next section).....
An interview with NEW YORK
An interview with NEW YORK TIMES bestselling author Pseudonymous Bosch. Exploring his latest BAD BOOKS series, and asking the important question: Does Pseudonymous Bosch believe in dragons?
LET'S BE FRIENDS! ?
ThinkActive: Designing for Pseudonymous Activity Tracking in the Classroom
Andrew Garbett, David Chatting, Gerard Wilkinson, Clement Lee, Ahmed Kharrufa
CHI '18: ACM CHI Conference on Human Factors in Computing Systems
Session: Personal Tracking
We report on the design of ThinkActive - a system to encourage primary aged school children to reflect on their own personal activity data in the classroom. We deployed the system with a cohort of 30 school children, over a six-week period, in partnership with an English Premier League Football club’s health and nutrition programme. The system utilizes inexpensive activity trackers and pseudonymous avatars to promote reflection with personal data using an in-situ display within the classroom. Our design explores pseudonymity as an approach to managing privacy and personal data within a public setting. We report on the motivations, challenges, and opportunities for students, teachers, and third-party providers to engage in the collection and sharing of activity data with primary school children.
Recorded at the ACM CHI Conference on Human Factors in Computing Systems in Montréal, Canada April 21-26, 2018