j:PersonNameCategoryCodeSimpleType

simpleType PersonNameCategoryCodeSimpleType in namespace http://release.niem.gov/niem/domains/jxdm/6.2/

Definition

A data type for possible kinds of names.

Diagram

Enumerations

ValueDefinition
akaAlso known as, e.g., a stage name
aliasAn assumed or alternate name suspected to be in use for deception; usually involves criminal intent. A term used in legal proceedings to connect the different names of anyone who has gone by two or more, and whose true name is for any cause doubtful.
call signA registered radio identifier used by amateur radio operators; usually a string of alpha-numeric characters.
dbaDoing business as
fkaFormerly known as
handleAn electronic pseudonym; intended to conceal the user's true identity. Commonly used areas include the Internet, chatrooms, networks, bulletin board systems (BBS), and Citizen's Band (CB) radio; sometimes used by radio operators as an alternative to a call sign. May or may not be used for criminal deception. (also screen name)
monikerA nickname specifically used by gang members or criminals to hide real identity for criminal purposes.
nicknameA descriptive name added to or replacing the actual name of a person, place, or thing. A familiar or shortened form of a proper name. (also street name)
otherNone of the other types is appropriate. (Explain in text field.)
providedA name communicated by an individual directly or through documentation being carried; obtained from the source of the record and which is not known to be an alias or aka name.
pseudonymA fictitious name, especially a pen name; not normally for criminal purposes.
unknownIndefinite; unsure of this type of name.
user idA number or name which is unique to a particular user of a computer or group of computers which share user information. A user id is not normally used for criminal intent, unless it is being used without authorization. An operating system uses the user id to represent the user in its data structures, e.g. the owner of a file or process, the person attempting to access a system resource. (also uid, userid)

XML Schema

<xs:simpleType name="PersonNameCategoryCodeSimpleType">
<xs:annotation>
<xs:documentation>
A data type for possible kinds of names.
</xs:documentation>
</xs:annotation>
<xs:enumeration value="aka">
<xs:annotation>
<xs:documentation>
Also known as, e.g., a stage name
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="alias">
<xs:annotation>
<xs:documentation>
An assumed or alternate name suspected to be in use for deception; usually involves criminal intent. A term used in legal proceedings to connect the different names of anyone who has gone by two or more, and whose true name is for any cause doubtful.
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="call sign">
<xs:annotation>
<xs:documentation>
A registered radio identifier used by amateur radio operators; usually a string of alpha-numeric characters.
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="dba">
<xs:annotation>
<xs:documentation>
Doing business as
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="fka">
<xs:annotation>
<xs:documentation>
Formerly known as
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="handle">
<xs:annotation>
<xs:documentation>
An electronic pseudonym; intended to conceal the user's true identity. Commonly used areas include the Internet, chatrooms, networks, bulletin board systems (BBS), and Citizen's Band (CB) radio; sometimes used by radio operators as an alternative to a call sign. May or may not be used for criminal deception. (also screen name)
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="moniker">
<xs:annotation>
<xs:documentation>
A nickname specifically used by gang members or criminals to hide real identity for criminal purposes.
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="nickname">
<xs:annotation>
<xs:documentation>
A descriptive name added to or replacing the actual name of a person, place, or thing. A familiar or shortened form of a proper name. (also street name)
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="other">
<xs:annotation>
<xs:documentation>
None of the other types is appropriate. (Explain in text field.)
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="provided">
<xs:annotation>
<xs:documentation>
A name communicated by an individual directly or through documentation being carried; obtained from the source of the record and which is not known to be an alias or aka name.
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="pseudonym">
<xs:annotation>
<xs:documentation>
A fictitious name, especially a pen name; not normally for criminal purposes.
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="unknown">
<xs:annotation>
<xs:documentation>
Indefinite; unsure of this type of name.
</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="user id">
<xs:annotation>
<xs:documentation>
A number or name which is unique to a particular user of a computer or group of computers which share user information. A user id is not normally used for criminal intent, unless it is being used without authorization. An operating system uses the user id to represent the user in its data structures, e.g. the owner of a file or process, the person attempting to access a system resource. (also uid, userid)
</xs:documentation>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>