<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr">
<p class="MsoNormal" style="margin:0cm 0cm 8pt;line-height:115%;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Dear Colleagues:<span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><i><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">The Journal of Technical Writing and Communication</span></i><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> (<i>JTWC</i>) invites article proposals for an
upcoming special issue that examines how technical communication contributes to
past, current, and future understandings of what it means to be “secure.”<span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><b><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Proposals Due:</span></b><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> October 15, 2024<span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><b><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Publication Date:</span></b><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> October 2025 (tentative)<span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><b><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Guest Editor: </span></b><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Dr. Christopher
J. Morris, Assistant Professor of Writing, York University<b><span></span></b></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><b><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Contact Info:</span></b><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"> <a href="mailto:christopher.jh.morris@gmail.com" target="_blank">christopher.jh.morris@gmail.com</a><span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">To read the full CFP, please continue scrolling or
visit <a href="https://docs.google.com/document/d/1C-EDE-yohJxtC41pBw_3ArMaKPK8tKlu4XS8ifkA-oU/edit?usp=sharing" target="_blank">this Google Doc</a>.<span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<h1 style="margin:18pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:20pt;font-family:"Aptos Display",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">Special Issue Description<span></span></span></h1>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">This special issue of <i>JTWC</i> explores how
technical communicators engage methods, cultures, and discourses that rely upon
threats to justify practices and policies. Such justifications—often used to
mitigate, neutralize, or manage real and purported danger—are referred to as
“security logics.” Today, security logics are leveraged to justify institutional
and organizational actions related to immigration, public health, policing, (inter)national
security, climate, reproductive rights, privacy and surveillance, election
integrity, and emergency management. Often, while couched in a promise of
safety, policies enacted in these areas contribute to the erosion of civil
liberties, violations of human rights, and the perpetuation of racial and economic
injustices. Meanwhile, acting as conduits for security logics are technical
communicators and common technical communication genres like manuals,
instructions, reports, data visualizations, proposals, translations, and UX/UI
design. Indeed, securitization can be inherent in technical communication and
the discipline’s defining values of safety and utility. This special issue
seeks both to confront technical communication’s complicity in corporate,
organizational, and state-sponsored security practices and to uncover how
ethical technical communication destabilizes conventional security logics for
more just outcomes. <span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<h3 style="margin:8pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:14pt;font-family:"Aptos",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">Security Logics and Technical Communication<span></span></span></h3>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">While <i>security measures</i> are
generally understood as preparation for threats, <i>security logics</i> are
rhetorics, discourses, and communication practices that construct or describe threats––and
thereby empower organizations and institutions to act in managing said threats.
Researchers, typically in critical security studies, tackle security logics
using frameworks like rhetorical theory, actor-network theory, and ethnography
to articulate how discursive and cultural justifications influence individual,
group, and organizational behaviors (Anwar et al., 2020; Macías-Rojas, 2018;
Sutler & Mutlu, 2013). Wrange (2022) has described security logics as “the
interplay of discursive practices on the constructions of identity, security
governance and the perception of threats” (p. 577). For Stępka (2022), security
logics comprise “an intersubjective practice of meaning making that triggers a
particular security-oriented mind-set and shapes the perception of both the
nature of the problem and actions undertaken to deal with it” (p. 34). Technical
communication externalizes both the perception of threats and the actions that address
threats. After all, the words, visuals, and designs that technical
communicators create carry rhetorical meanings as well as practical and
technical applications.<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Moreover, according to Berling et al. (2022), “Securitization
theory was not set up to just describe a reality of security politics. Rather,
the construction of the concept of securitization also reflected political and
ethical considerations about the political performativity involved in any use
(or non-definition) of security” (p. 7). Thus, technical communication
scholarship can add to security studies and vice versa by considering
performativity as not just political discourse, but also technical and
communicative labor constitutive of “security” (and raising the question of security
for whom). Notably, in this regard, Longo (2000) contends that documentation
and operation standards in technical writing can contribute to workplace
cultures of panopticism. Likewise, Scott (2003) illustrates how medical technology
and rhetoric can constitute surveillance of marginalized groups; and, on the
other hand, Ding (2009), for example, has addressed such concerns by considering
how unauthorized risk communication amid the SARS epidemic reveals possibilities
for more ethical technical communication. <span> </span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Given the prominence of technical communication
in maintaining securitization’s entangled infrastructures (as noted in the
works of scholars like Longo and Scott for instance), several definitive
questions arise for scholars and practitioners of technical communication: <span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">What are the technical
communication genres, technologies, discourses, and workflows that contribute
to security apparatuses, and to what effect?</span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">How do security logics in technical
communication influence, stigmatize, or support particular audiences,
communities, or spaces?<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">In what ways
do rights advocates and those affected by security logics leverage technical
communication for their own personal and local benefit? </span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">How can
technical communicators ethically engage technology, institutionalization, and
data without passively succumbing to the perniciousness of security logics? </span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">How should we
use technical communication to distinguish meaningfully between justified and
unjustified security logics for securitization adherents as well as skeptics?</span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">How might
security studies inform, clarify, or expand technical communication and vice
versa?</span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Research in technical communication has largely
engaged security logics only indirectly, by way of several discrete (though
related) subareas, namely ethics, risk/crisis communication, surveillance
studies, and tactical communication. Therefore, we have an opportunity to
examine security logics on its own terms as principle and praxis. We might
consider:<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<h4 style="margin:4pt 0cm 2pt;line-height:115%;break-after:avoid;font-size:12pt;font-family:"Aptos",sans-serif;color:rgb(15,71,97);font-weight:normal;font-style:italic"><span lang="EN-US">Ethics<span></span></span></h4>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">The field of ethics in technical communication analyzes
the extent to which writers and designers can affect outcomes, both good and
bad. This consideration can be applied to security apparatuses that rely on
documentation, technology, and rhetoric. Katz (1992) identified the “ethic of
expediency” in his rhetorical analysis of Nazi technical documentation that was
used in Germany’s bid to “secure” the Third Reich. Stanchevici (2013) later
adopts Katz’s concerns about expediency, by showing how security service
reports rhetorically classified Soviet citizens in ways that empowered Stalin’s
regime. Similarly, Ridolfo & Hart-Davidson’s 2019 edited collection <i>Rhet
Ops: Rhetoric and Information Warfare</i> establishes a critical imbrication
between digital technology, applied rhetoric, and securitization in the
post-9/11 U.S.<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<h4 style="margin:4pt 0cm 2pt;line-height:115%;break-after:avoid;font-size:12pt;font-family:"Aptos",sans-serif;color:rgb(15,71,97);font-weight:normal;font-style:italic"><span lang="EN-US">Risk/Crisis Communication<span></span></span></h4>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Organizations and communities use risk/crisis
communication to convey information about threats. For best results, these
communication processes rely on effective, ethical (though oftentimes
challenging) methods. Scott (2003), for example, has shown how particularistic
constructions of “risk” related to HIV deployed security logics that actually
further imperiled communities-at-risk. Youngblood (2012) has examined how an “access-security
tension” influenced local government agencies in how they shared public information
about emergencies. More recently, Young (2020) has explored how user
experience design and technical communication contributed to a “privacy crisis”
for Zoom post-COVID, wherein the application’s security and users’ privacy had
been compromised. <span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<h4 style="margin:4pt 0cm 2pt;line-height:115%;break-after:avoid;font-size:12pt;font-family:"Aptos",sans-serif;color:rgb(15,71,97);font-weight:normal;font-style:italic"><span lang="EN-US">Surveillance Studies<span></span></span></h4>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Surveillance generally entails monitoring others
to ensure security. Technical communicators participate in this monitoring,
sometimes intentionally, sometimes not. <span> </span>Young (2023), in articulating the
ever-expanding relationship between technical communication and surveillance, has
noted that “Themes of cultural imperialism are particularly present in national
security rhetoric.” In considering pedagogical implications, Pflugfelder &
Reeves (2024) demonstrate how surveillance and security motivate pedagogical
approaches to artificial intelligence. <span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<h4 style="margin:4pt 0cm 2pt;line-height:115%;break-after:avoid;font-size:12pt;font-family:"Aptos",sans-serif;color:rgb(15,71,97);font-weight:normal;font-style:italic"><span lang="EN-US">Tactical Technical Communication<span></span></span></h4>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Tactical technical communication, a
do-it-yourself approach practiced by non-state, non-institutional actors,
offers a potential starting point from which to conceptualize technical
communication beyond or against security logics. Randall (2022) has called for
a tactical technical communication not based in utility, while Aguilar (2022) has
recognized “indirect communication” practiced by marginalized groups as
additionally “tactical.”<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<h2 style="margin:8pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:16pt;font-family:"Aptos Display",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">Practical Relevance<span></span></span></h2>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Security logics have wide-ranging applications,
and technical communication’s role in those applications—be they digital
technology, surveillance, privacy and data concerns, or otherwise—may continue
to come under greater scrutiny. Thus, this special issue provides
practitioners, researchers, and educators opportunities: to revisit codes of
conduct and ethics; to develop heuristics and strategies for identifying
effective and ineffective security practices; to draft and implement
appropriate, humane risk/crisis communication campaigns; to think through ways
to engage students and colleagues in discussions about the real-world impact of
technical communication labor; and to generate other next steps for those invested
in articulating and/or responding to security logics. <span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<h2 style="margin:8pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:16pt;font-family:"Aptos Display",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">Specific Topics that May Be Covered <span></span></span></h2>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">This call invites proposals for case studies and
original research articles that explore a relationship between security logics
and technical communication practices. Proposals by U.S. and international
contributors from higher education, industry, and government are all welcome
and encouraged. Submission topics may include but are not limited to:<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Risk/crisis communication<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Surveillance studies<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Usability/UX/UI<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Medical/health communication<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Tactical technical communication<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Documentation<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Border rhetorics<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Rhetorical legitimation<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-family:Symbol;color:black;border:1pt windowtext;padding:0cm"><span>·<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Ethics<span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Public writing</span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p style="margin:0cm 0cm 0cm 18pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Organizational
communication</span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<h2 style="margin:8pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:16pt;font-family:"Aptos Display",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">Submission
Guidelines<span></span></span></h2>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Please email proposals (of no more than 400 words, not
including citations and references) as a .doc file to Chris Morris (<a href="mailto:christopher.jh.morris@gmail.com" target="_blank">christopher.jh.morris@gmail.com</a>),
with the subject line “[Last Name] JTWC Proposal on Security Logics.”<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">All proposals should include:<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p style="margin:0cm 0cm 0cm 36pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Author name(s), affiliation(s), and
email address(es)<span></span></span></p>
<p style="margin:0cm 0cm 0cm 36pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">A provisional, descriptive title for
the proposed article<span></span></span></p>
<p style="margin:0cm 0cm 0cm 36pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">A summary of the topic/focus of the
proposed article<span></span></span></p>
<p style="margin:0cm 0cm 0cm 36pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">An explanation of how the proposed
topic/focus connects to the theme of the issue<span></span></span></p>
<p style="margin:0cm 0cm 0cm 36pt;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:Symbol;color:black"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">An overview of the
structure/organization of the proposed article (i.e. how the author will
address the topic within the context of the proposed article)<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Questions about this special issue and prospective
submissions should be directed to the guest editor, Chris Morris, at <a href="mailto:christopher.jh.morris@gmail.com" target="_blank">christopher.jh.morris@gmail.com</a>.<span></span></span></p>
<h1 style="margin:18pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:20pt;font-family:"Aptos Display",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">Timeline<span></span></span></h1>
<p style="line-height:150%;margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">CFP
published: <b>August 15, 2024</b><span></span></span></p>
<p style="line-height:150%;margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Proposals
due (400-word max): <b>October 15, 2024</b><span></span></span></p>
<p style="line-height:150%;margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Authors
notified by: <b>November 15, 2024</b><span></span></span></p>
<p style="line-height:150%;margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Full
manuscript drafts due: <b>March 15, 2025</b> <span></span></span></p>
<p style="line-height:150%;margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Reviews
to authors: <b>May 15, 2025</b><span></span></span></p>
<p style="line-height:150%;margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Revised
manuscript due: <b>July 15, 2025</b><span></span></span></p>
<p style="margin:0cm;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-family:"Arial",sans-serif;color:black">Special issue published: <b>October 2025<span></span></b></span></p>
<h1 style="margin:18pt 0cm 4pt;line-height:115%;break-after:avoid;font-size:20pt;font-family:"Aptos Display",sans-serif;color:rgb(15,71,97);font-weight:normal"><span lang="EN-US">References<span></span></span></h1>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Aguilar, G. L.
(2022). Framing undocumented migrants as tactical technical communicators: The
tactical in humanitarian technical communication. <i>2022 IEEE International
Professional Communication Conference (ProComm)</i>, 246–250. <a href="https://doi.org/10.1109/ProComm53155.2022.00051" target="_blank">https://doi.org/10.1109/ProComm53155.2022.00051</a></span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Anwar, N. H.,
Sawas, A., & Mustafa, D. (2020). Without water, there is no life:
Negotiating everyday risks and gendered insecurities in Karachi’s informal
settlements. <i>Urban Studies</i>, 57(6), 1320–1337. <a href="https://doi.org/10.1177/0042098019834160" target="_blank">https://doi.org/10.1177/0042098019834160</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Berling, T.
V., Gad, U. P., Petersen, K. L., & Wæver, O. (2022). <i>Translations of security:
a framework for the study of unwanted futures</i> (1st ed.). Routledge. <a href="https://doi.org/10.4324/9781003175247" target="_blank">https://doi.org/10.4324/9781003175247</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Ding, H. (2009). Rhetorics of
alternative media in an emerging epidemic: SARS, censorship, and
extra-institutional risk communication. <i>Technical Communication Quarterly</i>,
18(4), 327–350. <a href="https://doi.org/10.1080/10572250903149548" target="_blank">https://doi.org/10.1080/10572250903149548</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Katz, S. B.
(1992). The ethic of expediency: Classical rhetoric, technology, and the
Holocaust. <i>College English</i>, 54(3), 255–275. <a href="https://doi.org/10.2307/378062" target="_blank">https://doi.org/10.2307/378062</a></span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Longo, B. (2000).
<i>Giant brains controlling scientific knowledge: A history (in progress) of
human/computer relationships</i>. New Histories of Writing, Session 2. 2000
MMLA Convention. Kansas City, MO. <span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><a href="https://case.edu/affil/sce/Texts/Longo.html" target="_blank">https://case.edu/affil/sce/Texts/Longo.html</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Macías-Rojas,
P. (2018). The prison and the border: An ethnography of shifting border
security logics. <i>Qualitative Sociology</i>, 41(2), 221–242. <a href="https://doi.org/10.1007/s11133-018-9382-2" target="_blank">https://doi.org/10.1007/s11133-018-9382-2</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Pflugfelder,
E. H., & Reeves, J. (2024). Surveillance work in (and) teaching technical
writing with AI. <i>Journal of Technical Writing and Communication</i>. <a href="https://doi.org/10.1177/00472816241260028" target="_blank">https://doi.org/10.1177/00472816241260028</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Randall, T. S.
(2022). Taking the tactical out of technical: A reassessment of tactical
technical communication. <i>Journal of Technical Writing and Communication</i>,
52(1), 3-18. <a href="https://doi.org/10.1177/00472816211006341" target="_blank">https://doi.org/10.1177/00472816211006341</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Salter, M. B.,
& Mutlu, C. E. (2013). <i>Research methods in critical security studies: An
introduction</i> (1st ed.). Routledge. <a href="https://doi.org/10.4324/9780203107119" target="_blank">https://doi.org/10.4324/9780203107119</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Scott, J. B.
(2003). <i>Risky rhetoric: AIDS and the cultural practices of HIV testing</i>.
Southern Illinois University Press.</span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Stanchevici,
D. (2013). The rhetorical construction of social classes in the reports of
Stalin’s secret police. <i>Journal of Technical Writing and Communication</i>, 43(3),
261–288. <a href="https://doi.org/10.2190/TW.43.3.c" target="_blank">https://doi.org/10.2190/TW.43.3.c</a></span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Stępka, M.
(2022). <i>Identifying security logics in the EU policy discourse: The migration
crisis and the EU</i>. Springer Nature.</span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Wrange, J.
(2022). Entangled security logics: From the decision-makers’ discourses to the
decision-takers’ interpretations of civil defence. <i>European Security</i>,
31(4), 576–596.<span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><a href="https://doi.org/10.1080/09662839.2021.2021889" target="_blank">https://doi.org/10.1080/09662839.2021.2021889</a></span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Young, S.
(2021). Zoombombing your toddler: User experience and the communication of
zoom’s privacy crisis. <i>Journal of Business and Technical Communication</i>,
35(1), 147-153. <a href="https://doi.org/10.1177/1050651920959201" target="_blank">https://doi.org/10.1177/1050651920959201</a><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"><span> </span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Young, S.
(2023). <i>Working through surveillance and technical communication:
Concepts and connections.</i> (1st ed.). State University of New York
Press.</span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm"> </span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
<p class="MsoNormal" style="margin:0cm;line-height:normal;vertical-align:baseline;font-size:12pt;font-family:"Aptos",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:black;border:1pt windowtext;padding:0cm">Youngblood, S.
A. (2012). Balancing the rhetorical tension between right to know and security
in risk communication: Ambiguity and avoidance. <i>Journal of Business and
Technical Communication</i>, 26(1), 35–64. <a href="https://doi.org/10.1177/1050651911421123" target="_blank">https://doi.org/10.1177/1050651911421123</a></span><span lang="EN-US" style="font-size:10pt;font-family:"Arial",sans-serif;color:black"><span></span></span></p>
</div>
</div></div>
</div></div>