The Readability Controversy: A Technical Writing Review
- 1 April 1990
- journal article
- research article
- Published by SAGE Publications in Journal of Technical Writing and Communication
- Vol. 20 (2) , 131-138
- https://doi.org/10.2190/u4ff-0l5q-fpd4-2dcj
Abstract
The author reviews recent articles from the technical writing literature focusing on the controversy surrounding the appropriateness of readability formulas for technical writing, an issue of immediate concern for many writers and editors. While some authorities recommend readability formulas—if the writer recognizes the formulas as a tool limited by the variables manipulated—overwhelming argument from other experts suggests that the formulas should be ignored because they can mislead writers by lulling them into a false sense of security or into writing stilted prose to fit the formula. The author suggests that further research should be conducted to study empirically how readability as a concept might be used to aid the technical writer since readability formulas are shaping computerized editing programs.Keywords
This publication has 9 references indexed in Scilit:
- Readability formulas: Useful or useless?IEEE Transactions on Dependable and Secure Computing, 1987
- Evaluating readabilityIEEE Transactions on Dependable and Secure Computing, 1985
- Understanding the limitations of readability formulasIEEE Transactions on Dependable and Secure Computing, 1981
- Why readability formulas failIEEE Transactions on Dependable and Secure Computing, 1981
- Readability formulas and technical communicationIEEE Transactions on Dependable and Secure Computing, 1981
- Computerized readability levelsIEEE Transactions on Dependable and Secure Computing, 1980
- Checked your fog index lately?IEEE Transactions on Dependable and Secure Computing, 1980
- The Technical Writer-Readability Formulas and the Nontechnical ReaderJournal of Technical Writing and Communication, 1977
- Readability in technical writing-principles and proceduresIEEE Transactions on Dependable and Secure Computing, 1975