- Research Article
- 10.1177/00472816251384902
- Dec 10, 2025
- Journal of Technical Writing and Communication
- Christopher J Morris
- Research Article
- 10.1177/00472816251384913
- Oct 27, 2025
- Journal of Technical Writing and Communication
- Mckinley Green
This paper reports on a user experience (UX) study investigating how college students navigate university-sponsored online systems for sharing chosen name and pronouns. While the opportunity to share gender identity ostensibly enables inclusive and usable systems for queer students, the visibility of gender nonconformity also imposes surveillance concerns, as pronouns have become an organizing tool for governments and university boards intent on limiting diversity, equity, and inclusion initiatives. Drawing from trans and queer scholarship, this article suggests that the concept of visibility should be closely scrutinized in design settings where heightened visibility can present risks to bodily autonomy or safety.
- Research Article
- 10.1177/00472816251384907
- Oct 21, 2025
- Journal of Technical Writing and Communication
- Natasha N Jones + 1 more
This article examines how technical communicators, specifically concerned with the overlap between design, community, and security logics, can better understand how certain ideals around security, surveillance and safety can reinforce or resist narratives about state-sponsored protections. We use the public and political controversy surrounding the Atlanta Public Safety Training Center (Cop City) as a backdrop for engaging the questions regarding technical communicators potential for intervening into unjust security logics that impact the environment and marginalized communities.
- Research Article
- 10.1177/00472816251384909
- Oct 17, 2025
- Journal of Technical Writing and Communication
- Brittany Halley + 1 more
The CIA's Operation PBSuccess represents a pivotal moment in Cold War securitization that illuminates technical communication's role in security contexts. We use Haas and Frost's apparent decolonial feminist (ADF) rhetoric of risk to trace how communicators mediated security logics across cultures and networks while exploiting technological asymmetries between the US and Guatemala. Building on theories of risk and (in)security framing, we demonstrate how the scriptwriters and hosts of Radio Liberación , as technical communicators, functioned as security actors complicit in the decades-long aftermath. We conclude by calling on technical communicators to approach risk communication through continued decolonial praxis.
- Research Article
- 10.1177/00472816251384948
- Oct 16, 2025
- Journal of Technical Writing and Communication
- Morgan C Banville + 1 more
This article demonstrates how biometric technologies operate through security logics, and how technical communicators can resist the process of securitization through what we refer to as “opt-out logics.” We question security logics through a case example of public-facing documentation from the Transportation Security Administration on the use of biometric technologies for domestic travel at airports across the United States. Our analysis focuses on three security logics: improving efficiency, mitigating risk, and paternalistic concern for passenger experience. To consider how these logics structure encounters, both authors provide personal narratives of their experience with biometric technologies in airports. Finally, drawing from tactical technical communication, we offer opt-out logics as modes of resistance in three categories: documentation, pedagogy, and design. We argue tactics of resistance are ways technical communicators can engage in resisting the expectation to opt in to systems.
- Research Article
- 10.1177/00472816251384898
- Oct 16, 2025
- Journal of Technical Writing and Communication
- Sarah Young + 1 more
Institutions create security regimes under the guise of protection, but these measures, even with the best intentions, can be problematic to execute due to competing logics, such as tensions between government regulations and institutional priorities. Data Protection Officers (DPOs) must navigate these conflicting logics, balancing data privacy with intuitional concerns. This article argues that DPOs can find power by identifying gaps between regulatory and institutional logics to form localized tactics to carry out their jobs in line with their own ethics and morals. By doing so, workers can reclaim power in the seemingly dominating power of security logics.
- Research Article
- 10.1177/00472816251384274
- Oct 15, 2025
- Journal of Technical Writing and Communication
- Emma J Rose + 2 more
Storytelling is a key component of user experience (UX) design practice. However, while storytelling is universally acknowledged as important, what exactly is meant by storytelling is elastic. This elasticity makes it hard to explain and teach to emerging practitioners. In this research paper, we propose a data-derived definition to bring more understanding to the concept of storytelling in UX. The contribution of this work is a multifaceted definition of storytelling in UX that can be used as a heuristic to help make it more meaningful and understandable to students and early career professionals. We conclude by providing strategies to incorporate the storytelling heuristic into UX pedagogy.
- Research Article
- 10.1177/00472816251384927
- Oct 9, 2025
- Journal of Technical Writing and Communication
- Priyanka Ganguly
This article examines United States Agency for International Development’s (USAID's) maternal health (MH) success stories as transnational assemblages that deploy security logics to justify external governance while appearing to celebrate local agency. Through rhetorical-cultural analysis of 25 narratives, I identify three recurring strategies—crisis amplification, representational homogenization, and paratextual techniques—that frame MH as requiring urgent intervention. These stories obscure local expertise and align care with donor-defined metrics and narrative arcs. Findings show that security logics circulate through genre conventions and design templates that normalize intervention as technical and humanitarian. I argue TPC scholars must examine assemblage mechanisms’ role in shaping representation, risk, and care transnationally.
- Research Article
- 10.1177/00472816251384930
- Oct 7, 2025
- Journal of Technical Writing and Communication
- Ryan Cheek
This article the Doomsday Clock and the Nuclear Football as interconnected technical communication artifacts that function as two sides of a “spurious coin” in the securitization of nuclear deterrence. While the Clock externalizes existential risk through apocalyptic rhetoric, the Football internalizes it within exclusive military command structures—together legitimizing perpetual nuclear crisis. Drawing on technical communication scholarship and critical security studies, the analysis argues that both artifacts sustain nuclearist ideology by reinforcing deterrence as common sense. The Clock's ominous countdown and the Football's ever-present launch capability are mutually validating and together normalize nuclear brinkmanship as the price of global security.
- Research Article
- 10.1177/00472816251342582
- May 19, 2025
- Journal of Technical Writing and Communication
- Leslie Seawright + 2 more
This study revisits Sam Dragga’s research on ethical decision-making in document design, updating it to reflect contemporary concerns. Our findings indicate that participants today perceive the document design scenarios as significantly more unethical than those in Dragga's original study, with heightened attention to accessibility, cultural sensitivity, and social justice. While Dragga's study emphasized concerns over the consequences of document design choices, our results suggest a shift in focus toward the writer's intent. Participants frequently judged deliberate manipulation as unethical, even in cases where no direct harm was evident. These findings highlight the evolving ethical priorities in technical communication and underscore the need for practitioners and educators to reassess and revise the field's guiding principles to align with contemporary values of inclusivity and social responsibility.