{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:16:30Z","timestamp":1760710590147,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,8]]},"DOI":"10.1145\/3411763.3450376","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:36:14Z","timestamp":1620434174000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["\u201cAll Names are Pseudonyms\u201d: A Critical Reflection on Pseudonymizing Names in HCI"],"prefix":"10.1145","author":[{"given":"Nana","family":"Kesewaa Dankwa","sequence":"first","affiliation":[{"name":"University of Kassel, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Emilia Aldrin. 2016. \"Names and identity\u201d. In The Oxford handbook of names and naming. https:\/\/doi.org\/10.1093\/oxfordhb\/9780199656431.0","DOI":"10.1093\/oxfordhb"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/1350506810386084"},{"key":"e_1_3_2_1_3_1","unstructured":"Kofi Agyekum. 2006. \"The sociolinguistic of Akan personal names.\"\u00a0Nordic journal of African studies\u00a015 no. 2."},{"key":"e_1_3_2_1_4_1","unstructured":"Diane Loviglio. May 9 2012. Picking Pseudonyms for your research participants https:\/\/blog.mozilla.org\/ux\/2012\/05\/picking-pseudonyms-for-your-research-participants\/#comments Accessed: 13.11.2020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Ruth ES Allen and Janine L. Wiles. \"A rose by any other name: Participants choosing research pseudonyms.\"\u00a0Qualitative Research in Psychology\u00a013 no. 2 (2016): 149-165.","DOI":"10.1080\/14780887.2015.1133746"},{"key":"e_1_3_2_1_6_1","unstructured":"John W. Creswell and Cheryl N. 2016. Poth.\u00a0Qualitative inquiry and research design: Choosing among five approaches. Sage publications"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Michelle Brear. \"Swazi co-researcher participants\u2019 dynamic preferences and motivations for representation with real names and (English-language) pseudonyms\u2013an ethnography.\"\u00a0Qualitative research\u00a018 no. 6 (2018): 722-740.","DOI":"10.1177\/1468794117743467"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Benjamin Baez. \"Confidentiality in qualitative research: Reflections on secrets power and agency.\"\u00a0Qualitative research\u00a02 no. 1 (2002): 35-58.","DOI":"10.1177\/1468794102002001638"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"James Giordano Michelle O'Reilly Helen Taylor and Nisha Dogra. \"Confidentiality and autonomy: The challenge (s) of offering research participants a choice of disclosing their identity.\"\u00a0Qualitative health research\u00a017 no. 2 (2007): 264-275.","DOI":"10.1177\/1049732306297884"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Sjaak Van Der Geest. \"Confidentiality and pseudonyms: A fieldwork dilemma from Ghana.\"\u00a0Anthropology Today\u00a019 no. 1 (2003): 14-18.","DOI":"10.1111\/1467-8322.00159"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Bernie Hogan 2015.\u00a0\u201cPseudonyms and the rise of the real-name Web\u201d. In: Hartley J Burgess J Bruns A (eds) A Companion to New Media Dynamics.\u00a0Chichester:\u00a0Wiley-Blackwell \u00a0290\u2013310.","DOI":"10.1002\/9781118321607.ch18"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"14","article-title":"Reading pseudonyms in seventeenth-century English coterie literature","volume":"21","author":"Ezell Margaret JM","year":"1994","unstructured":"Margaret JM Ezell. 1994. \"Reading pseudonyms in seventeenth-century English coterie literature.\"\u00a0Essays in Literature\u00a021, no. 1, 14-26.","journal-title":"\u00a0Essays in Literature\u00a0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800415572391"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Giuliana Viglione. 2020. \"Racism and harassment are common in field research-scientists are speaking up.\"\u00a0Nature\u00a0585 no. 7823: 15-16.","DOI":"10.1038\/d41586-020-02328-y"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Finda Ihudiya","year":"2020","unstructured":"Ogbonnaya-Ogburu, Ihudiya Finda, Angela DR Smith, Alexandra To, and Kentaro Toyama. \"Critical Race Theory for HCI.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-16. 2020."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Daniel G. Sol\u00f3rzano and Tara J. Yosso. \"Critical race methodology: Counter-storytelling as an analytical framework for education research.\"\u00a0Qualitative inquiry\u00a08 no. 1 (2002): 23-44.","DOI":"10.1177\/107780040200800103"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Christopher Dunbar. 2008. \"Critical race theory and indigenous methodologies.\"\u00a0Handbook of critical and indigenous methodologies 85-99. https:\/\/doi.org\/10.4135\/9781483385686.n5","DOI":"10.4135\/9781483385686.n5"},{"key":"e_1_3_2_1_18_1","volume-title":"Lauren Dyll and Michael Francis","author":"Tomaselli Kenyan G.","year":"2008","unstructured":"Kenyan G. Tomaselli, Lauren Dyll and Michael Francis. 2008. \u2018Self\u2019 and \u2018Other,\u2019.\u00a0Handbook of Critical and Indigenous Methodologies, ed. Norman K. Denzin, Yvonna S. Lincoln, and Linda Tuhiwai Smith (Thousand Oaks, CA: Sage, 2008), 347-72."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Rankin Yolanda A. Jakita O. Thomas and Nicole M. Joseph. \"Intersectionality in HCI: Lost in translation.\"\u00a0Interactions\u00a027 no. 5 (2020): 68-71.","DOI":"10.1145\/3416498"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Sarah Abel George F. Tyson and Gisli Palsson. \"From enslavement to emancipation: naming practices in the Danish West Indies.\"\u00a0Comparative Studies in Society and History\u00a061 no. 2 (2019): 332-365.","DOI":"10.1017\/S0010417519000070"},{"volume-title":"The woman next door","author":"Omotoso Yewande","key":"e_1_3_2_1_22_1","unstructured":"Yewande Omotoso, 2016. The woman next door. Random House."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Heyer Jeremy Zachary Schmitt Lynn Dombrowski and Svetlana Yarosh. 2020. \"Opportunities for Enhancing Access and Efficacy of Peer Sponsorship in Substance Use Disorder Recovery.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems pp. 1-14.","DOI":"10.1145\/3313831.3376241"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"Flexible","author":"Hodge James","year":"2020","unstructured":"James Hodge, Sarah Foley, Rens Brankaert, Gail Kenning, Amanda Lazar, Jennifer Boger, and Kellie Morrissey. 2020. \"Relational, Flexible, Everyday: Learning from Ethics in Dementia Research.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-16."},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Wendy Casey, Suzanne Cleage, Danny C.","author":"Hui Julie","year":"2020","unstructured":"Julie Hui, Nefer Ra Barber, Wendy Casey, Suzanne Cleage, Danny C. Dolley, Frances Worthy, Kentaro Toyama, and Tawanna R. Dillahunt. 2020. \"Community Collectives: Low-tech Social Support for Digitally-Engaged Entrepreneurship.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-15."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Defining Challenges and Envisioning Community-Centered Solutions.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Haimson Oliver L","unstructured":"Oliver L Haimson., Dykee Gorrell, Denny L. Starks, and Zu Weinger. 2020. \"Designing Trans Technology: Defining Challenges and Envisioning Community-Centered Solutions.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-13."},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"Baym","author":"Nancy","year":"2020","unstructured":"Trieu, Penny, and Nancy K. Baym. 2020. \"Private Responses for Public Sharing: Understanding Self-Presentation and Relational Maintenance via Stories in Social Media.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-13."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"Cella Monet Sum, and Stacy M. Branham","author":"Edwards Emory James","year":"2020","unstructured":"Emory James Edwards, Cella Monet Sum, and Stacy M. Branham. 2020. \"Three Tensions Between Personas and Complex Disability Identities.\" In\u00a0Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-9."},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"Colin M. Gray, and Hwajung Hong.","author":"Jo Eunkyung","year":"2020","unstructured":"Eunkyung Jo, Austin L. Toombs, Colin M. Gray, and Hwajung Hong. 2020. \"Understanding Parenting Stress through Co-designed Self-Trackers.\" In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-13."},{"volume-title":"An introduction","author":"Delgado Richard","key":"e_1_3_2_1_30_1","unstructured":"Richard Delgado and Jean Stefancic. 2017.\u00a0Critical race theory: An introduction. Vol. 20. nYU Press."},{"key":"e_1_3_2_1_31_1","volume-title":"Mitchell","author":"Lemley Christine","year":"2012","unstructured":"Christine Lemley and Roland W. Mitchell. 2012. \"Narrative inquiry: Stories lived, stories told.\"\u00a0Qualitative research: An introduction to methods and designs: 215-241."},{"key":"e_1_3_2_1_32_1","volume-title":"Research and indigenous peoples","author":"Smith Linda Tuhiwai","year":"2013","unstructured":"Linda Tuhiwai Smith,\u00a0Decolonizing methodologies: Research and indigenous peoples. Zed Books Ltd., 2013."},{"key":"e_1_3_2_1_33_1","first-page":"32","volume-title":"An Interview Study.\" In\u00a0International Conference on Human-Computer Interaction","author":"Dankwa Nana Kesewaa","unstructured":"Nana Kesewaa Dankwa. 2020 \"Investigating Smart Home Needs for Elderly Women Who Live Alone. An Interview Study.\" In\u00a0International Conference on Human-Computer Interaction, pp. 32-38. Springer, Cham."},{"key":"e_1_3_2_1_34_1","volume-title":"Giving voice and qualitative research involving individuals that type to communicate.\"\u00a0Disability Studies Quarterly\u00a031, no. 4","author":"Christine E.","year":"2011","unstructured":"Ashby, Christine E. \"Whose\" voice\" is it anyway?: Giving voice and qualitative research involving individuals that type to communicate.\"\u00a0Disability Studies Quarterly\u00a031, no. 4 (2011)."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '21"},"container-title":["Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411763.3450376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411763.3450376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:42Z","timestamp":1750199562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411763.3450376"}},"subtitle":["\u201cAll Names are Pseudonyms\u201d"],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":34,"alternative-id":["10.1145\/3411763.3450376","10.1145\/3411763"],"URL":"https:\/\/doi.org\/10.1145\/3411763.3450376","relation":{},"subject":[],"published":{"date-parts":[[2021,5,8]]},"assertion":[{"value":"2021-05-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}