Schema Central > NIEM 2.0 > jxdm.xsd > j:personNameCategoryCode
Advanced search
Need NIEM Help?

Recommended Reading:

Definitive XML Schema

 

Web Service Contract Design and Versioning for SOA

 

Advanced XML Applications

 

j:personNameCategoryCode

A kind of name for a person.

Attribute information

Value

  • Type based on xsd:token
    • Valid valueDescription
      akaAlso known as, e.g., a stage name
      aliasAn assumed or alternate name suspected to be in use for deception; usually involves criminal intent. A term used in legal proceedings to connect the different names of anyone who has gone by two or more, and whose true name is for any cause doubtful.
      call signA registered radio identifier used by amateur radio operators; usually a string of alpha-numeric characters.
      dbaDoing business as
      fkaFormerly known as
      handleAn electronic pseudonym; intended to conceal the user's true identity. Commonly used areas include the Internet, chatrooms, networks, bulletin board systems (BBS), and Citizen's Band (CB) radio; sometimes used by radio operators as an alternative to a call sign. May or may not be used for criminal deception. (also screen name)
      monikerA nickname specifically used by gang members or criminals to hide real identity for criminal purposes.
      nicknameA descriptive name added to or replacing the actual name of a person, place, or thing. A familiar or shortened form of a proper name. (also street name)
      otherNone of the other types is appropriate. (Explain in text field.)
      providedA name communicated by an individual directly or through documentation being carried; obtained from the source of the record and which is not known to be an alias or aka name.
      pseudonymA fictitious name, especially a pen name; not normally for criminal purposes.
      unknownIndefinite; unsure of this type of name.
      user idA number or name which is unique to a particular user of a computer or group of computers which share user information. A user id is not normally used for criminal intent, unless it is being used without authorization. An operating system uses the user id to represent the user in its data structures, e.g. the owner of a file or process, the person attempting to access a system resource. (also uid, userid)
  • Used in

    Site developed and hosted by Datypic, Inc.

    Please report errors or comments about this site to pwalmsley@datypic.com