Browse Definitions :
Definition

pseudonymity

Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym. In pseudonymous systems, real identities are only available to site administrators.

Pseudonymity allows users to communicate with one and other in a generally anonymous way. Pseudonyms are typically user-chosen names. Pseudonymity helps maintain user privacy and enables free speech without security worries.

Very few sites and services are really anonymous, but there are varying degrees of anonymity. Facebook, for example, requires individuals to use their real names. On some forums and other venues, the user’s pseudonym and IP address may be displayed along with location information, which can make their identity relatively easy to detect.

Anonymity cannot be assured even if only site owners have information that links users to their posts and the identifying information is encrypted. All encryption can be broken, given sufficient time and compute resources. Furthermore, there are so many ways to link users to their true identities that most anonymity on the web can be said to be either pseudonymity or pseudo-anonymity. Pseudo-anonymity contrasts with pseudonymity in that it allows users to post or comment without the use of any type of identifier.

This was last updated in November 2015

Continue Reading About pseudonymity

Networking
  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

Security
  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • governance, risk and compliance (GRC)

    Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies among the following...

  • total risk

    Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.

CIO
  • microtargeting

    Microtargeting (also called micro-niche targeting) is a marketing strategy that uses consumer data and demographics to identify ...

  • business process

    A business process is an activity or set of activities that accomplish a specific organizational goal. Business processes should ...

  • business process improvement (BPI)

    Business process improvement (BPI) is a practice in which enterprise leaders analyze their business processes to identify areas ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

  • Salesforce DX

    Salesforce DX, or SFDX, is a set of software development tools that lets developers build, test and ship many kinds of ...

Close