Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • Open Access Icon
  • Research Article
  • 10.1177/00472816251384902
Introduction to Special Issue: Technical Communication In/Against Security Logics
  • Dec 10, 2025
  • Journal of Technical Writing and Communication
  • Christopher J Morris

  • Research Article
  • 10.1177/00472816251384913
Trans and Queer Visibility in an Era of Hyper Surveillance: A User Experience Study of University Systems for Sharing Gender Pronouns
  • Oct 27, 2025
  • Journal of Technical Writing and Communication
  • Mckinley Green

This paper reports on a user experience (UX) study investigating how college students navigate university-sponsored online systems for sharing chosen name and pronouns. While the opportunity to share gender identity ostensibly enables inclusive and usable systems for queer students, the visibility of gender nonconformity also imposes surveillance concerns, as pronouns have become an organizing tool for governments and university boards intent on limiting diversity, equity, and inclusion initiatives. Drawing from trans and queer scholarship, this article suggests that the concept of visibility should be closely scrutinized in design settings where heightened visibility can present risks to bodily autonomy or safety.

  • Open Access Icon
  • Research Article
  • 10.1177/00472816251384907
Cop City Counternarratives: Security Logics, Sociotechnical Environments, and Marginalized Communities
  • Oct 21, 2025
  • Journal of Technical Writing and Communication
  • Natasha N Jones + 1 more

This article examines how technical communicators, specifically concerned with the overlap between design, community, and security logics, can better understand how certain ideals around security, surveillance and safety can reinforce or resist narratives about state-sponsored protections. We use the public and political controversy surrounding the Atlanta Public Safety Training Center (Cop City) as a backdrop for engaging the questions regarding technical communicators potential for intervening into unjust security logics that impact the environment and marginalized communities.

  • Research Article
  • 10.1177/00472816251384909
Lessons in Security Logics from Cold-War Guatemala
  • Oct 17, 2025
  • Journal of Technical Writing and Communication
  • Brittany Halley + 1 more

The CIA's Operation PBSuccess represents a pivotal moment in Cold War securitization that illuminates technical communication's role in security contexts. We use Haas and Frost's apparent decolonial feminist (ADF) rhetoric of risk to trace how communicators mediated security logics across cultures and networks while exploiting technological asymmetries between the US and Guatemala. Building on theories of risk and (in)security framing, we demonstrate how the scriptwriters and hosts of Radio Liberación , as technical communicators, functioned as security actors complicit in the decades-long aftermath. We conclude by calling on technical communicators to approach risk communication through continued decolonial praxis.

  • Research Article
  • 10.1177/00472816251384948
How Biometrics Travel: Reimagining Opt-Out Logics
  • Oct 16, 2025
  • Journal of Technical Writing and Communication
  • Morgan C Banville + 1 more

This article demonstrates how biometric technologies operate through security logics, and how technical communicators can resist the process of securitization through what we refer to as “opt-out logics.” We question security logics through a case example of public-facing documentation from the Transportation Security Administration on the use of biometric technologies for domestic travel at airports across the United States. Our analysis focuses on three security logics: improving efficiency, mitigating risk, and paternalistic concern for passenger experience. To consider how these logics structure encounters, both authors provide personal narratives of their experience with biometric technologies in airports. Finally, drawing from tactical technical communication, we offer opt-out logics as modes of resistance in three categories: documentation, pedagogy, and design. We argue tactics of resistance are ways technical communicators can engage in resisting the expectation to opt in to systems.

  • Research Article
  • 10.1177/00472816251384898
Agency Between Logics: Data Privacy Tactics, Ethics, and the Power of the Data Protection Officer
  • Oct 16, 2025
  • Journal of Technical Writing and Communication
  • Sarah Young + 1 more

Institutions create security regimes under the guise of protection, but these measures, even with the best intentions, can be problematic to execute due to competing logics, such as tensions between government regulations and institutional priorities. Data Protection Officers (DPOs) must navigate these conflicting logics, balancing data privacy with intuitional concerns. This article argues that DPOs can find power by identifying gaps between regulatory and institutional logics to form localized tactics to carry out their jobs in line with their own ethics and morals. By doing so, workers can reclaim power in the seemingly dominating power of security logics.

  • Research Article
  • 10.1177/00472816251384274
The Multifaceted Purposes of Storytelling in User Experience Design Practice
  • Oct 15, 2025
  • Journal of Technical Writing and Communication
  • Emma J Rose + 2 more

Storytelling is a key component of user experience (UX) design practice. However, while storytelling is universally acknowledged as important, what exactly is meant by storytelling is elastic. This elasticity makes it hard to explain and teach to emerging practitioners. In this research paper, we propose a data-derived definition to bring more understanding to the concept of storytelling in UX. The contribution of this work is a multifaceted definition of storytelling in UX that can be used as a heuristic to help make it more meaningful and understandable to students and early career professionals. We conclude by providing strategies to incorporate the storytelling heuristic into UX pedagogy.

  • Research Article
  • 10.1177/00472816251384927
Constructing Transnational Security Logics: The Representation of Mothers and Communities in Global Maternal Health Narratives
  • Oct 9, 2025
  • Journal of Technical Writing and Communication
  • Priyanka Ganguly

This article examines United States Agency for International Development’s (USAID's) maternal health (MH) success stories as transnational assemblages that deploy security logics to justify external governance while appearing to celebrate local agency. Through rhetorical-cultural analysis of 25 narratives, I identify three recurring strategies—crisis amplification, representational homogenization, and paratextual techniques—that frame MH as requiring urgent intervention. These stories obscure local expertise and align care with donor-defined metrics and narrative arcs. Findings show that security logics circulate through genre conventions and design templates that normalize intervention as technical and humanitarian. I argue TPC scholars must examine assemblage mechanisms’ role in shaping representation, risk, and care transnationally.

  • Research Article
  • 10.1177/00472816251384930
Apocalyptic Technical Communication from Clockface to Briefcase: Revealing the Spurious Coin of Nuclear-Security Rhetoric
  • Oct 7, 2025
  • Journal of Technical Writing and Communication
  • Ryan Cheek

This article the Doomsday Clock and the Nuclear Football as interconnected technical communication artifacts that function as two sides of a “spurious coin” in the securitization of nuclear deterrence. While the Clock externalizes existential risk through apocalyptic rhetoric, the Football internalizes it within exclusive military command structures—together legitimizing perpetual nuclear crisis. Drawing on technical communication scholarship and critical security studies, the analysis argues that both artifacts sustain nuclearist ideology by reinforcing deterrence as common sense. The Clock's ominous countdown and the Football's ever-present launch capability are mutually validating and together normalize nuclear brinkmanship as the price of global security.

  • Research Article
  • 10.1177/00472816251342582
“Is This Ethical?” New Data on the Ethical Principles and Practices of Document Design
  • May 19, 2025
  • Journal of Technical Writing and Communication
  • Leslie Seawright + 2 more

This study revisits Sam Dragga’s research on ethical decision-making in document design, updating it to reflect contemporary concerns. Our findings indicate that participants today perceive the document design scenarios as significantly more unethical than those in Dragga's original study, with heightened attention to accessibility, cultural sensitivity, and social justice. While Dragga's study emphasized concerns over the consequences of document design choices, our results suggest a shift in focus toward the writer's intent. Participants frequently judged deliberate manipulation as unethical, even in cases where no direct harm was evident. These findings highlight the evolving ethical priorities in technical communication and underscore the need for practitioners and educators to reassess and revise the field's guiding principles to align with contemporary values of inclusivity and social responsibility.