Browse Definitions :

Crisis, crises, crisies

Writing for Business

Which is correct?

interrobang When Ben Franklin said nothing is certain but death and taxes, he could have added one more sure thing: We can be certain there will be at least a few ______ in our lives.a. crisises
b. crises
c. crisies

Answer: b

Explanation:

I was writing about crisis management recently and it occurred to me that the plural of crisis is another of those tricky irregular ones. Sure enough, I found 30,200 Google hits for crisies and 101,000 for crisises. Both wrong. Maybe there are four sure things: death, taxes, crises and spelling errors.

Death and taxes is a phrase that resonates. Here’s the original quotation:

Our new Constitution is now established, and has an appearance that promises permanency; but in this world nothing can be said to be certain, except death and taxes.
Benjamin Franklinin a letter to Jean-Baptiste Leroy, 1789
More on crises and similar plurals:

Quite a few words that end in is are pluralized by changing is to es. Here are a few more examples:

singular plural
axis axes
analysis analyses
basis bases
diagnosis diagnoses
ellipsis ellipses
emphasis emphases
hypothesis hypotheses
neurosis neuroses
oasis oases
parenthesis parentheses
thesis theses

Grammarist provides a handy reference for irregular plurals  from which I swiped the examples above. You should go look — she’s got lots more.

twitter bird  Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

SearchNetworking
  • network security

    Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.

  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • digital marketing

    Digital marketing is a general term for any effort by a company to connect with customers through electronic technology.

  • hockey stick growth

    Hockey stick growth is a growth pattern in a line chart that shows a sudden and extremely rapid growth after a long period of ...

  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

Close