Browse Definitions :

The irony of using quotation marks for emphasis

Writing for Business

Which would you use to advertise a sale?
a. “Excellent” deals on new and used iPhones!
b. Excellent deals on new and used iPhones!
c. Excellent deals on new and used iPhones!



Answer: b. or c.

Explanation:
If you want to emphasize the word excellent, you want to do just about anything but put it in quotation marks. Really. The use of italics is standard but you can underline, bold, use a different color — do what it takes, if you feel a word needs a little extra oomph. Just don’t do what many small-business people do — put the words they want to shout in quotation marks.

It’s quite ironic: People often use quotation marks to add emphasis to certain words but they’re actually subverting their intended meaning. Quotation marks around words can instruct the reader to think the words mean something other than what they say. It’s like adding a wink to your statement, so people know you’re kidding. If your message is that your iPhone sale is excellent, you don’t want to write that it’s “excellent.”

Want more information? The Yahoo! Style Guide provides an excellent (no quotes!) entry about when to use — and when not to use — quotation marks.

Amused by grammar gaffes? The “Blog” of “Unnecessary” Quotation Marks is always good for a giggle.

 Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close