Browse Definitions :
Definition

lexical ambiguity

Contributor(s): Ivy Wigmore

Lexical ambiguity is the potential for multiple interpretations of spoken or written language that renders it difficult or impossible to understand without some additional information. The ambiguity typically results from the fact that words can mean different things; the additional information typically supplies context that clarifies which meaning is intended in this instance. Lexical means related to words, from the Greek lexikos.

Lexical ambiguity is what makes puns and other types of wordplay funny, and unintentional humor can occur when words aren’t considered carefully enough. For example, the Columbia Journalism Review once published a collection of ambiguous headlines, such as “Red Tape Holds up New Bridge.” The ambiguity there results from the fact that holds up can mean both delays and supports, and the humor comes from the fact that the idea of holding a bridge in place with red tape is ridiculous. Headlines rendered difficult to parse because of ambiguity are sometimes known as crash blossoms, so-named for one that appeared in Japan Today: “Violinist Linked to JAL Crash Blossoms.”

Lexical ambiguity is often contrasted with structural or syntactic ambiguity, which complicates the interpretation of written or spoken language because of the way in which words or phrases are arranged. Linguistic ambiguity, which includes both of these as well as other categories, is a particular problem for natural language processing (NLP) programs. Word sense disambiguation (WSD) is an essential component of speech recognition, text analytics and other language-processing applications.

This was last updated in January 2019

Continue Reading About lexical ambiguity

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close