SlideShare a Scribd company logo
1 of 15
“STILL AROUND”: EXPERIENCES AND SURVIVAL
STRATEGIES OF VETERAN WOMEN SOFTWARE
DEVELOPERS
Sterre van Breukelen Ann Barcomb Sebastian Baltes Alexander Serebrenik
Eindhoven University of
Technology
University of Calgary University of Adelaide
Eindhoven University of
Technology
The Netherlands Canada Australia The Netherlands
Tokyo. Japan. 1997. Peter Marlow
Foundation Photographer Member of
RQ1. What age- and gender-specific experiences have veteran software
developers of marginalized genders had in their careers?
RQ2. What strategies have veteran software developers of marginalized genders
adopted that they perceive as contributing to their survival in software
engineering?
van Breukelen, Barcomb, Baltes, Serebrenik "STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 45th International Conference on Software Engineering, 2023
Baltes, Park, Serebrenik. Is 40 the new 60? How popular media portrays the employability of older software developers, IEEE Software, 37(6):26-31, 2020
Greta Hoffman from Pexels
A company approached me. . . They were like
‘our ideal candidate would be a Woman of
Color [who has] also survived a stroke’. —Elliot
As I approached menopause, there was another
shift of just this contempt, because you’re not
even a sexually available female. And there’s ‘No,
I don’t even have an interest in having sex with
you and so why would I ever listen to you?‘
You’re going to try and tell me I’m wrong and
you’re unattractive.’ So it got worse.. —Emery
+
-
All those young guys don’t want their mom
programming with them, their grandmother, on
the other hand. —Dani
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers

More Related Content

Similar to “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers

Spohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptxSpohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptxISSIP
 
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Christo Ananth
 
Integrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system designIntegrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system designpbelouin
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Christo Ananth
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...CS, NcState
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
From Software through Art to Social Entrepreneurship
From Software through Art to Social EntrepreneurshipFrom Software through Art to Social Entrepreneurship
From Software through Art to Social EntrepreneurshipLetizia Jaccheri
 
Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014Camille Baker, PhD
 
Social Software and Community Information Systems
Social Software and Community Information SystemsSocial Software and Community Information Systems
Social Software and Community Information SystemsRalf Klamma
 
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia IranicaSocio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia IranicaDr. Minoo Alemi
 
Hacking the Body - Wearable Horizons
Hacking the Body - Wearable HorizonsHacking the Body - Wearable Horizons
Hacking the Body - Wearable HorizonsDr Kate Sicchio
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
 
Digital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdfDigital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdfSuchithraNP1
 
Software Technology Insurance for Customers
Software Technology Insurance for CustomersSoftware Technology Insurance for Customers
Software Technology Insurance for CustomersSPIN Chennai
 
AudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdfAudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdfTapajitDey1
 
Communication between open source developers
Communication between open source developersCommunication between open source developers
Communication between open source developersAlexander Serebrenik
 
Free/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS ProfessionalFree/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS ProfessionalAshok Kumar Satapathy
 
Skeuomorphic Design Research
Skeuomorphic Design ResearchSkeuomorphic Design Research
Skeuomorphic Design ResearchHoward Chen
 
Spohrer UCSC-SV 20230418 v14.pptx
Spohrer UCSC-SV 20230418 v14.pptxSpohrer UCSC-SV 20230418 v14.pptx
Spohrer UCSC-SV 20230418 v14.pptxISSIP
 

Similar to “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers (20)

Spohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptxSpohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptx
 
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
 
Integrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system designIntegrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system design
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
From Software through Art to Social Entrepreneurship
From Software through Art to Social EntrepreneurshipFrom Software through Art to Social Entrepreneurship
From Software through Art to Social Entrepreneurship
 
Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014
 
Social Software and Community Information Systems
Social Software and Community Information SystemsSocial Software and Community Information Systems
Social Software and Community Information Systems
 
SHV 2016 Article
SHV 2016 ArticleSHV 2016 Article
SHV 2016 Article
 
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia IranicaSocio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
 
Hacking the Body - Wearable Horizons
Hacking the Body - Wearable HorizonsHacking the Body - Wearable Horizons
Hacking the Body - Wearable Horizons
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
 
Digital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdfDigital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdf
 
Software Technology Insurance for Customers
Software Technology Insurance for CustomersSoftware Technology Insurance for Customers
Software Technology Insurance for Customers
 
AudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdfAudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdf
 
Communication between open source developers
Communication between open source developersCommunication between open source developers
Communication between open source developers
 
Free/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS ProfessionalFree/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS Professional
 
Skeuomorphic Design Research
Skeuomorphic Design ResearchSkeuomorphic Design Research
Skeuomorphic Design Research
 
Spohrer UCSC-SV 20230418 v14.pptx
Spohrer UCSC-SV 20230418 v14.pptxSpohrer UCSC-SV 20230418 v14.pptx
Spohrer UCSC-SV 20230418 v14.pptx
 

More from Alexander Serebrenik

Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Alexander Serebrenik
 
Towards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotTowards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
 
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...Alexander Serebrenik
 
Emotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsEmotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsAlexander Serebrenik
 
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Alexander Serebrenik
 
Diversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomDiversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomAlexander Serebrenik
 
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAn Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAlexander Serebrenik
 
Classification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsClassification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsAlexander Serebrenik
 
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsWhat Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsAlexander Serebrenik
 
From team organisation to software quality
From team organisation to software qualityFrom team organisation to software quality
From team organisation to software qualityAlexander Serebrenik
 
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Alexander Serebrenik
 
My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)Alexander Serebrenik
 
Opinion Mining for Software Engineering
Opinion Mining for Software EngineeringOpinion Mining for Software Engineering
Opinion Mining for Software EngineeringAlexander Serebrenik
 
Removing Self Admitted Technical Debt
Removing Self Admitted Technical DebtRemoving Self Admitted Technical Debt
Removing Self Admitted Technical DebtAlexander Serebrenik
 
Gender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringGender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringAlexander Serebrenik
 
Identifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the ArtIdentifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the ArtAlexander Serebrenik
 
Social software engineering and Open science
Social software engineering and Open scienceSocial software engineering and Open science
Social software engineering and Open scienceAlexander Serebrenik
 

More from Alexander Serebrenik (20)

Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...
 
Towards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotTowards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBot
 
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
 
Emotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsEmotion Analysis in Software Ecosystems
Emotion Analysis in Software Ecosystems
 
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
 
Alexander - intro
Alexander - introAlexander - intro
Alexander - intro
 
Diversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomDiversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroom
 
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAn Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
 
Classification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsClassification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis Alarms
 
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsWhat Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
 
Gender and Community Smells
Gender and Community SmellsGender and Community Smells
Gender and Community Smells
 
Bias in MSR Research
Bias in MSR ResearchBias in MSR Research
Bias in MSR Research
 
From team organisation to software quality
From team organisation to software qualityFrom team organisation to software quality
From team organisation to software quality
 
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
 
My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)
 
Opinion Mining for Software Engineering
Opinion Mining for Software EngineeringOpinion Mining for Software Engineering
Opinion Mining for Software Engineering
 
Removing Self Admitted Technical Debt
Removing Self Admitted Technical DebtRemoving Self Admitted Technical Debt
Removing Self Admitted Technical Debt
 
Gender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringGender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software Engineering
 
Identifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the ArtIdentifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the Art
 
Social software engineering and Open science
Social software engineering and Open scienceSocial software engineering and Open science
Social software engineering and Open science
 

Recently uploaded

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Recently uploaded (20)

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers

  • 1. “STILL AROUND”: EXPERIENCES AND SURVIVAL STRATEGIES OF VETERAN WOMEN SOFTWARE DEVELOPERS Sterre van Breukelen Ann Barcomb Sebastian Baltes Alexander Serebrenik Eindhoven University of Technology University of Calgary University of Adelaide Eindhoven University of Technology The Netherlands Canada Australia The Netherlands
  • 2.
  • 3. Tokyo. Japan. 1997. Peter Marlow Foundation Photographer Member of
  • 4. RQ1. What age- and gender-specific experiences have veteran software developers of marginalized genders had in their careers? RQ2. What strategies have veteran software developers of marginalized genders adopted that they perceive as contributing to their survival in software engineering?
  • 5. van Breukelen, Barcomb, Baltes, Serebrenik "STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 45th International Conference on Software Engineering, 2023
  • 6. Baltes, Park, Serebrenik. Is 40 the new 60? How popular media portrays the employability of older software developers, IEEE Software, 37(6):26-31, 2020
  • 8.
  • 9.
  • 10. A company approached me. . . They were like ‘our ideal candidate would be a Woman of Color [who has] also survived a stroke’. —Elliot As I approached menopause, there was another shift of just this contempt, because you’re not even a sexually available female. And there’s ‘No, I don’t even have an interest in having sex with you and so why would I ever listen to you?‘ You’re going to try and tell me I’m wrong and you’re unattractive.’ So it got worse.. —Emery + -
  • 11.
  • 12. All those young guys don’t want their mom programming with them, their grandmother, on the other hand. —Dani

Editor's Notes

  1. Good morning, Alexander and I are going to present our paper on experiences and survival strategies of veteran women software developers. This is joint work with Sterre and Ann. Sterre was a master’s student at TU Eindhoven who we supervised together. This research has been triggered by a tweet of Tracy Chou. She is one of Time's 12 Women of the Year (2022), a software engineer and advocate for diversity in technology-related fields. Her tweet alludes to the negative experiences and rarity of older women who are still active in the field of software development. While recent years have seen growing research attention to diversity in software engineering, and both age and gender have been studied independently, the experiences of veteran women and non-binary people who have remained in the software industry have been rarely considered.
  2. It is worth looking at the continuation of Tracy’s tweet. She mentions being 10 years in tech, loving software engineering, but hating the environment, and being told that there’s no sexism and that she’s only projecting it to her environment. This is what motivated us to study and better understand the specific experiences of veteran women software developers. Gaslighting is the subjective experience of having one's reality repeatedly questioned by another.
  3. Indeed, veteran women find themselves at the intersection of ageism and sexism: Software developers are overwhelmingly younger men, considering what we know about developer demographics from surveys. Besides well-established sexism in the field of software engineering, statements such as Mark Zuckerberg’s famous quote that “Young people are just smarter” point to ageism in the industry.
  4. It is important to understand that experiences of individuals on the intersection of diversity aspects cannot be reduced to combinations of individual aspects. For example, Ross et al. have observed that the experiences of Black women differ from those of Black men and of non-Black women: “a smaller percentage of Black women reported being introduced to CS by a family member or a friend (17% and 3%, respectively) than was the case for non-Black women (24% and 10%, respectively) and Black men (21% and 9%, respectively).” Moreover, Black women do not necessarily know whether their negative experiences should be attributed to their gender or their race. Kimberlé Crenshaw introduced the concept of intersectionality, arguing that diversity aspects are not mutually exclusive but intersecting, implying that one should be acutely aware of different challenges experienced by people at the intersection of multiple diversity aspects. Monique Ross, Zahra Hazari, Gerhard Sonnert, Philip M. Sadler: The Intersection of Being Black and Being a Woman: Examining the Effect of Social Computing Relationships on Computer Science Career Choice. ACM Trans. Comput. Educ. 20(2): 9:1-9:15 (2020)
  5. Hence, our research questions were:… In your research questions and sampling approach, we included all marginalized genders, but our participants identified as women plus one non-binary person who identified as woman for most of their career. Hence our results focus on women, while our research questions are broader.
  6. We started with Twitter users participating in the before-mentioned thread, then checked their self-identified gender based on Twitter profiles and websites. We looked for pronouns and gendered terms (e.g., “mother”). Then sent a screening survey to all users with public contact details that were not men. To the 39 respondents, we then applied our our filtering criteria based on age, experience, still working in industry, and self-identified gender.
  7. To this end we have conducted a series of interviews with veteran women. We started with participants in the aforementioned thread. To identify women among the participants we looked into pronouns used on their profiles and gendered terms (such as ‘mother’).
  8. All these strategies have been proposed for “older developers”, but how old is old? Still, even the highest number, 50+ years, which is a common threshold in scientific papers [6], is far away from a typical retirement age in industrialized countries.
  9. Previous research has shown that 40 is the threshold when developers are starting to be seen as old, so we have reused the same threshold in the current study. We further operationalized ‘older’ as having at least 18 years of experience in the software industry, based on a typical career including school and university.
  10. To evaluate the stability of our findings, we also included three participants that, while not strictly belonging to the target demographics, might share experiences and strategies with other interviewees. One participant slightly younger, one who left the industry, and one identified as non-binary. The answers of those participants were in line with the other feedback we got from our interviews. In total, we have conducted 14 interviews until reaching saturation.
  11. Now Alexander is going to take over for the results. Overview of Sterre’s findings: strategies, experiences and perception. Of course, I do not expect you to see all the details. older women, who are sometimes unsure of whether the negative experiences were because of their gender or their age. There were not many Positive experiences related to age and gender, although Being a Role Model and More Opportunities Due to Gender and Age were found. One participant described how companies specifically looking to develop products aimed at her demographic led to opportunities: “A company approached me and said they were in the business, they wanted to make an app that would help predict who would have a stroke. . . They were like ‘our ideal candidate would be a Woman of Color [who has] also survived a stroke.’ ” Negative experiences were far more common, such as Seen as Non/less Technical , which has also been widely observed in the literature. We found that Gender Related Strategies contained the most strategies, with eight separate categories and 308 code segments. The categories were: Against Gender Bias Strategies, Career Related Strategies, Changing Work Environment, Changing Your Appearance, Communication Methods, Ignoring Situations, Traditionally Feminine, and Traditionally Masculine. Of these, Against Gender Bias Strategies was the largest category, with 70 code segments and eight subcodes, such as Backing Other Women Up
  12. Here we see the part of the sunburst related to experiences. We see many things that we have expected in relation to gender (e,g., sexism) and age (e.g., being considered behind on tech or too expensive). What is important is that intervieweesare sometimes unsure of whether the negative experiences were because of their gender or their age.
  13. Here we see the part of the sunburst related to experiences. older women, who are sometimes unsure of whether the negative experiences were because of their gender or their age. Please take time to read he quotes.
  14. On this slide we see strategies that the interviewees have implemented to survive. Some of the age-related strategies such as leveraging experience, or teaching new techniques have been discussed before; similarly exposing biases and backing up other women have been discussed in the literature. I would like to highlight a one of the strategies related to the intersection of gender and age.
  15. Dani’s quote suggests that age might be considered a positive after a certain point. At least when discussing programming with young men. Additionally, it might give some idea of how aging affects women within the industry. Dani’s quote suggests that when women are middle-aged, they are considered mothers, and when they are elderly, they are grandmothers. This highlights how women are thought of as motherly figures, which is seen in other strategies and experiences. This is also an example of the most diverse subcategory “Standing against bias”.
  16. So what does this all mean? Organisations should invest in creating a good working environment and a positive atmosphere, investing older developers of marginalized genders with sense of control of their work and their careers, supporting their promotion, assigning tasks and paying them on par with men. While these recommendations are true for any employer, they are even more pertinent for software engineering given the scarcity of older women and non-binary people in this industry. Moreover, specifically in case of software engineering the inclusion of developers who are more representative of the population ensures that the software can meet the needs of society as a whole.
  17. Developers themselves can move to a different work environment (e.g., by starting their company, moving to a different company, becoming consultant or manager) or try to change their work environment (e.g., by unionizing, standing up against gender bias or carving new opportunities for themselves). Changing appearance is one of the commonly mentioned but profoundly problematic strategies.
  18. So to summarise: we have tried to understand the experiences of veteran women, and recall that ‘veteran’ is 40 or older. We have conducted a series of interviews. We made several recommendations both to organisations and to veteran women developing software. We recognise that these recommendations are merely band aid solutions applied to systemic issues; however, we hope that in short-term they might help developers to survive in the industry.