Browse Definitions :
Definition

pseudo-anonymity

Pseudo-anonymity is the appearance – but not the reality--of anonymity online.

Most commonly, pseudo-anonymity enables anonymous posting and commenting. Pseudo-anonymous users have no visible identifier, and information that can be linked to them is only available to service providers or site administrators (unless the users themselves provide such information in their messages). However, that doesn't mean that messages can't be traced back to their sources. Users are generally required to provide some form of ID for sign up and IP addresses are typically logged and saved.

Many sites or services that allow anonymous posting stipulate that the administrators can provide police with user IP addresses, GPS coordinates, device details and data and time for each message if supported by a search warrant, court order or subpoena. Some sites also make user info available to other businesses and advertisers.

While pseudo-anonymity can be good for civil liberties, privacy and security, some users may exploit it to be abusive to other users or to vandalize sites. On truly anonymous sites, such behavior can be hard to regulate as users can return almost indefinitely. On pseudo-anonymous sites, however, administrators have access to information that can be used to ban users and keep them from returning.

Pseudoanonymity is related to pseudonymity, the more commonly seen system, in which users are identified by something other than their actual names.

See also: Pseudonymous profile

This was last updated in November 2015

Continue Reading About pseudo-anonymity

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close