Browse Definitions :

ingenuous vs. disingenuous

Writing for Business

Which is correct?
The media is being __________ when it follows a vendor’s lead and calls a blatant marketing event a “news conference.”
a. ingenuous
b. disingenuous

Answer: b

Explanation:
Unless we see the press as being naive and easily duped, they’re disingenuous in this context.

In yesterday’s post, I wrote about ingenious vs. ingenuous and mentioned that a lot of people don’t seem to realize there are two different words. I came across one mention of a Microsoft Word correction error, in which some typoed version of ingenious is corrected to ingenuous.

One thing I hadn’t anticipated was that other people seem to use ingenuous when they mean disingenuous.

Here’s the first definition of ingenuous that pops up in a Google search:

in·gen·u·ous/inˈjenyo͞oəs/
Adjective:
(of a person or action) Innocent and unsuspecting.
Synonyms:
artless – naive – candid – frank – simple – guileless

Someone is disingenuous if they are insincere but pretend to have those qualities. I suspect the use of ingenuous to mean disingenuous comes from thinking the word is linked to genuine, so ingenuous might mean not genuine.

And then there are people throwing ingenuine into the mix. Darren Barefoot, seeking support, found 19,100 Google hits for it — but none in dictionaries. That was in 2007. Let’s see… Today we’re up to 98,800. That means that, although ingenuine is still not a word, it may well be some day. Adding a new category for posts now: Non-words.

Dig Deeper on Writing for Business

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close