SlideShare a Scribd company logo
“STILL AROUND”: EXPERIENCES AND SURVIVAL
STRATEGIES OF VETERAN WOMEN SOFTWARE
DEVELOPERS
Sterre van Breukelen Ann Barcomb Sebastian Baltes Alexander Serebrenik
Eindhoven University of
Technology
University of Calgary University of Adelaide
Eindhoven University of
Technology
The Netherlands Canada Australia The Netherlands
Tokyo. Japan. 1997. Peter Marlow
Foundation Photographer Member of
RQ1. What age- and gender-specific experiences have veteran software
developers of marginalized genders had in their careers?
RQ2. What strategies have veteran software developers of marginalized genders
adopted that they perceive as contributing to their survival in software
engineering?
van Breukelen, Barcomb, Baltes, Serebrenik "STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 45th International Conference on Software Engineering, 2023
Baltes, Park, Serebrenik. Is 40 the new 60? How popular media portrays the employability of older software developers, IEEE Software, 37(6):26-31, 2020
Greta Hoffman from Pexels
A company approached me. . . They were like
‘our ideal candidate would be a Woman of
Color [who has] also survived a stroke’. —Elliot
As I approached menopause, there was another
shift of just this contempt, because you’re not
even a sexually available female. And there’s ‘No,
I don’t even have an interest in having sex with
you and so why would I ever listen to you?‘
You’re going to try and tell me I’m wrong and
you’re unattractive.’ So it got worse.. —Emery
+
-
All those young guys don’t want their mom
programming with them, their grandmother, on
the other hand. —Dani
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers

More Related Content

Similar to “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers

Spohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptxSpohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptx
ISSIP
 
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Christo Ananth
 
Integrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system designIntegrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system design
pbelouin
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”
Christo Ananth
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
CS, NcState
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
Sebastiano Panichella
 
From Software through Art to Social Entrepreneurship
From Software through Art to Social EntrepreneurshipFrom Software through Art to Social Entrepreneurship
From Software through Art to Social Entrepreneurship
Letizia Jaccheri
 
Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014
Camille Baker, PhD
 
Social Software and Community Information Systems
Social Software and Community Information SystemsSocial Software and Community Information Systems
Social Software and Community Information Systems
Ralf Klamma
 
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia IranicaSocio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
Dr. Minoo Alemi
 
Hacking the Body - Wearable Horizons
Hacking the Body - Wearable HorizonsHacking the Body - Wearable Horizons
Hacking the Body - Wearable HorizonsDr Kate Sicchio
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Margaret-Anne Storey
 
Digital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdfDigital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdf
SuchithraNP1
 
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdf
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdfMost Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdf
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdf
InsightsSuccess4
 
Software Technology Insurance for Customers
Software Technology Insurance for CustomersSoftware Technology Insurance for Customers
Software Technology Insurance for Customers
SPIN Chennai
 
AudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdfAudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdf
TapajitDey1
 
Communication between open source developers
Communication between open source developersCommunication between open source developers
Communication between open source developers
Alexander Serebrenik
 
Free/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS ProfessionalFree/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS ProfessionalAshok Kumar Satapathy
 
Skeuomorphic Design Research
Skeuomorphic Design ResearchSkeuomorphic Design Research
Skeuomorphic Design Research
Howard Chen
 

Similar to “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers (20)

Spohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptxSpohrer EMAC 20230509 v14.pptx
Spohrer EMAC 20230509 v14.pptx
 
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
 
Integrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system designIntegrating qualitative data analysis and interactive system design
Integrating qualitative data analysis and interactive system design
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”
 
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
PROMISE 2011: Seven Habits of High Impactful Empirical Software Engineers (La...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
From Software through Art to Social Entrepreneurship
From Software through Art to Social EntrepreneurshipFrom Software through Art to Social Entrepreneurship
From Software through Art to Social Entrepreneurship
 
Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014Wearable Hhorizons Conference 2014
Wearable Hhorizons Conference 2014
 
Social Software and Community Information Systems
Social Software and Community Information SystemsSocial Software and Community Information Systems
Social Software and Community Information Systems
 
SHV 2016 Article
SHV 2016 ArticleSHV 2016 Article
SHV 2016 Article
 
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia IranicaSocio-Cognitive Engineering: A New Transactions for Scientia Iranica
Socio-Cognitive Engineering: A New Transactions for Scientia Iranica
 
Hacking the Body - Wearable Horizons
Hacking the Body - Wearable HorizonsHacking the Body - Wearable Horizons
Hacking the Body - Wearable Horizons
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
 
Digital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdfDigital Design - An Embedded Systems Approach Using Verilog.pdf
Digital Design - An Embedded Systems Approach Using Verilog.pdf
 
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdf
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdfMost Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdf
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdf
 
Software Technology Insurance for Customers
Software Technology Insurance for CustomersSoftware Technology Insurance for Customers
Software Technology Insurance for Customers
 
AudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdfAudrisMockus_MSR22.pdf
AudrisMockus_MSR22.pdf
 
Communication between open source developers
Communication between open source developersCommunication between open source developers
Communication between open source developers
 
Free/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS ProfessionalFree/Open Source Software in Libraries and LIS Professional
Free/Open Source Software in Libraries and LIS Professional
 
Skeuomorphic Design Research
Skeuomorphic Design ResearchSkeuomorphic Design Research
Skeuomorphic Design Research
 

More from Alexander Serebrenik

Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...
Alexander Serebrenik
 
Towards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotTowards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBot
Alexander Serebrenik
 
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
Alexander Serebrenik
 
Emotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsEmotion Analysis in Software Ecosystems
Emotion Analysis in Software Ecosystems
Alexander Serebrenik
 
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Alexander Serebrenik
 
Alexander - intro
Alexander - introAlexander - intro
Alexander - intro
Alexander Serebrenik
 
Diversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomDiversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroom
Alexander Serebrenik
 
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAn Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
Alexander Serebrenik
 
Classification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsClassification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis Alarms
Alexander Serebrenik
 
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsWhat Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
Alexander Serebrenik
 
Gender and Community Smells
Gender and Community SmellsGender and Community Smells
Gender and Community Smells
Alexander Serebrenik
 
Bias in MSR Research
Bias in MSR ResearchBias in MSR Research
Bias in MSR Research
Alexander Serebrenik
 
From team organisation to software quality
From team organisation to software qualityFrom team organisation to software quality
From team organisation to software quality
Alexander Serebrenik
 
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Alexander Serebrenik
 
My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)
Alexander Serebrenik
 
Opinion Mining for Software Engineering
Opinion Mining for Software EngineeringOpinion Mining for Software Engineering
Opinion Mining for Software Engineering
Alexander Serebrenik
 
Removing Self Admitted Technical Debt
Removing Self Admitted Technical DebtRemoving Self Admitted Technical Debt
Removing Self Admitted Technical Debt
Alexander Serebrenik
 
Gender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringGender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software Engineering
Alexander Serebrenik
 
Identifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the ArtIdentifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the Art
Alexander Serebrenik
 
Social software engineering and Open science
Social software engineering and Open scienceSocial software engineering and Open science
Social software engineering and Open science
Alexander Serebrenik
 

More from Alexander Serebrenik (20)

Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...Software development is a human activity: understanding software requires und...
Software development is a human activity: understanding software requires und...
 
Towards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBotTowards Continuous Performance Assessment of Java Applications With PerfBot
Towards Continuous Performance Assessment of Java Applications With PerfBot
 
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...
 
Emotion Analysis in Software Ecosystems
Emotion Analysis in Software EcosystemsEmotion Analysis in Software Ecosystems
Emotion Analysis in Software Ecosystems
 
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...
 
Alexander - intro
Alexander - introAlexander - intro
Alexander - intro
 
Diversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroomDiversity and inclusion in a CS classroom
Diversity and inclusion in a CS classroom
 
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAn Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
 
Classification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis AlarmsClassification and Ranking of Delta Static Analysis Alarms
Classification and Ranking of Delta Static Analysis Alarms
 
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsWhat Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
What Is an AI Engineer? An Empirical Analysis of Job Ads in The Netherlands
 
Gender and Community Smells
Gender and Community SmellsGender and Community Smells
Gender and Community Smells
 
Bias in MSR Research
Bias in MSR ResearchBias in MSR Research
Bias in MSR Research
 
From team organisation to software quality
From team organisation to software qualityFrom team organisation to software quality
From team organisation to software quality
 
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...
 
My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)My research story (presentation at ICSE 2021 New Faculty Symposium)
My research story (presentation at ICSE 2021 New Faculty Symposium)
 
Opinion Mining for Software Engineering
Opinion Mining for Software EngineeringOpinion Mining for Software Engineering
Opinion Mining for Software Engineering
 
Removing Self Admitted Technical Debt
Removing Self Admitted Technical DebtRemoving Self Admitted Technical Debt
Removing Self Admitted Technical Debt
 
Gender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software EngineeringGender Diversity and Inclusion and Software Engineering
Gender Diversity and Inclusion and Software Engineering
 
Identifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the ArtIdentifying Developers’ Gender: State of the Art
Identifying Developers’ Gender: State of the Art
 
Social software engineering and Open science
Social software engineering and Open scienceSocial software engineering and Open science
Social software engineering and Open science
 

Recently uploaded

Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 

Recently uploaded (20)

Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 

“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers

  • 1. “STILL AROUND”: EXPERIENCES AND SURVIVAL STRATEGIES OF VETERAN WOMEN SOFTWARE DEVELOPERS Sterre van Breukelen Ann Barcomb Sebastian Baltes Alexander Serebrenik Eindhoven University of Technology University of Calgary University of Adelaide Eindhoven University of Technology The Netherlands Canada Australia The Netherlands
  • 2.
  • 3. Tokyo. Japan. 1997. Peter Marlow Foundation Photographer Member of
  • 4. RQ1. What age- and gender-specific experiences have veteran software developers of marginalized genders had in their careers? RQ2. What strategies have veteran software developers of marginalized genders adopted that they perceive as contributing to their survival in software engineering?
  • 5. van Breukelen, Barcomb, Baltes, Serebrenik "STILL AROUND": Experiences and Survival Strategies of Veteran Women Software Developers. 45th International Conference on Software Engineering, 2023
  • 6. Baltes, Park, Serebrenik. Is 40 the new 60? How popular media portrays the employability of older software developers, IEEE Software, 37(6):26-31, 2020
  • 8.
  • 9.
  • 10. A company approached me. . . They were like ‘our ideal candidate would be a Woman of Color [who has] also survived a stroke’. —Elliot As I approached menopause, there was another shift of just this contempt, because you’re not even a sexually available female. And there’s ‘No, I don’t even have an interest in having sex with you and so why would I ever listen to you?‘ You’re going to try and tell me I’m wrong and you’re unattractive.’ So it got worse.. —Emery + -
  • 11.
  • 12. All those young guys don’t want their mom programming with them, their grandmother, on the other hand. —Dani

Editor's Notes

  1. Good morning, Alexander and I are going to present our paper on experiences and survival strategies of veteran women software developers. This is joint work with Sterre and Ann. Sterre was a master’s student at TU Eindhoven who we supervised together. This research has been triggered by a tweet of Tracy Chou. She is one of Time's 12 Women of the Year (2022), a software engineer and advocate for diversity in technology-related fields. Her tweet alludes to the negative experiences and rarity of older women who are still active in the field of software development. While recent years have seen growing research attention to diversity in software engineering, and both age and gender have been studied independently, the experiences of veteran women and non-binary people who have remained in the software industry have been rarely considered.
  2. It is worth looking at the continuation of Tracy’s tweet. She mentions being 10 years in tech, loving software engineering, but hating the environment, and being told that there’s no sexism and that she’s only projecting it to her environment. This is what motivated us to study and better understand the specific experiences of veteran women software developers. Gaslighting is the subjective experience of having one's reality repeatedly questioned by another.
  3. Indeed, veteran women find themselves at the intersection of ageism and sexism: Software developers are overwhelmingly younger men, considering what we know about developer demographics from surveys. Besides well-established sexism in the field of software engineering, statements such as Mark Zuckerberg’s famous quote that “Young people are just smarter” point to ageism in the industry.
  4. It is important to understand that experiences of individuals on the intersection of diversity aspects cannot be reduced to combinations of individual aspects. For example, Ross et al. have observed that the experiences of Black women differ from those of Black men and of non-Black women: “a smaller percentage of Black women reported being introduced to CS by a family member or a friend (17% and 3%, respectively) than was the case for non-Black women (24% and 10%, respectively) and Black men (21% and 9%, respectively).” Moreover, Black women do not necessarily know whether their negative experiences should be attributed to their gender or their race. Kimberlé Crenshaw introduced the concept of intersectionality, arguing that diversity aspects are not mutually exclusive but intersecting, implying that one should be acutely aware of different challenges experienced by people at the intersection of multiple diversity aspects. Monique Ross, Zahra Hazari, Gerhard Sonnert, Philip M. Sadler: The Intersection of Being Black and Being a Woman: Examining the Effect of Social Computing Relationships on Computer Science Career Choice. ACM Trans. Comput. Educ. 20(2): 9:1-9:15 (2020)
  5. Hence, our research questions were:… In your research questions and sampling approach, we included all marginalized genders, but our participants identified as women plus one non-binary person who identified as woman for most of their career. Hence our results focus on women, while our research questions are broader.
  6. We started with Twitter users participating in the before-mentioned thread, then checked their self-identified gender based on Twitter profiles and websites. We looked for pronouns and gendered terms (e.g., “mother”). Then sent a screening survey to all users with public contact details that were not men. To the 39 respondents, we then applied our our filtering criteria based on age, experience, still working in industry, and self-identified gender.
  7. To this end we have conducted a series of interviews with veteran women. We started with participants in the aforementioned thread. To identify women among the participants we looked into pronouns used on their profiles and gendered terms (such as ‘mother’).
  8. All these strategies have been proposed for “older developers”, but how old is old? Still, even the highest number, 50+ years, which is a common threshold in scientific papers [6], is far away from a typical retirement age in industrialized countries.
  9. Previous research has shown that 40 is the threshold when developers are starting to be seen as old, so we have reused the same threshold in the current study. We further operationalized ‘older’ as having at least 18 years of experience in the software industry, based on a typical career including school and university.
  10. To evaluate the stability of our findings, we also included three participants that, while not strictly belonging to the target demographics, might share experiences and strategies with other interviewees. One participant slightly younger, one who left the industry, and one identified as non-binary. The answers of those participants were in line with the other feedback we got from our interviews. In total, we have conducted 14 interviews until reaching saturation.
  11. Now Alexander is going to take over for the results. Overview of Sterre’s findings: strategies, experiences and perception. Of course, I do not expect you to see all the details. older women, who are sometimes unsure of whether the negative experiences were because of their gender or their age. There were not many Positive experiences related to age and gender, although Being a Role Model and More Opportunities Due to Gender and Age were found. One participant described how companies specifically looking to develop products aimed at her demographic led to opportunities: “A company approached me and said they were in the business, they wanted to make an app that would help predict who would have a stroke. . . They were like ‘our ideal candidate would be a Woman of Color [who has] also survived a stroke.’ ” Negative experiences were far more common, such as Seen as Non/less Technical , which has also been widely observed in the literature. We found that Gender Related Strategies contained the most strategies, with eight separate categories and 308 code segments. The categories were: Against Gender Bias Strategies, Career Related Strategies, Changing Work Environment, Changing Your Appearance, Communication Methods, Ignoring Situations, Traditionally Feminine, and Traditionally Masculine. Of these, Against Gender Bias Strategies was the largest category, with 70 code segments and eight subcodes, such as Backing Other Women Up
  12. Here we see the part of the sunburst related to experiences. We see many things that we have expected in relation to gender (e,g., sexism) and age (e.g., being considered behind on tech or too expensive). What is important is that intervieweesare sometimes unsure of whether the negative experiences were because of their gender or their age.
  13. Here we see the part of the sunburst related to experiences. older women, who are sometimes unsure of whether the negative experiences were because of their gender or their age. Please take time to read he quotes.
  14. On this slide we see strategies that the interviewees have implemented to survive. Some of the age-related strategies such as leveraging experience, or teaching new techniques have been discussed before; similarly exposing biases and backing up other women have been discussed in the literature. I would like to highlight a one of the strategies related to the intersection of gender and age.
  15. Dani’s quote suggests that age might be considered a positive after a certain point. At least when discussing programming with young men. Additionally, it might give some idea of how aging affects women within the industry. Dani’s quote suggests that when women are middle-aged, they are considered mothers, and when they are elderly, they are grandmothers. This highlights how women are thought of as motherly figures, which is seen in other strategies and experiences. This is also an example of the most diverse subcategory “Standing against bias”.
  16. So what does this all mean? Organisations should invest in creating a good working environment and a positive atmosphere, investing older developers of marginalized genders with sense of control of their work and their careers, supporting their promotion, assigning tasks and paying them on par with men. While these recommendations are true for any employer, they are even more pertinent for software engineering given the scarcity of older women and non-binary people in this industry. Moreover, specifically in case of software engineering the inclusion of developers who are more representative of the population ensures that the software can meet the needs of society as a whole.
  17. Developers themselves can move to a different work environment (e.g., by starting their company, moving to a different company, becoming consultant or manager) or try to change their work environment (e.g., by unionizing, standing up against gender bias or carving new opportunities for themselves). Changing appearance is one of the commonly mentioned but profoundly problematic strategies.
  18. So to summarise: we have tried to understand the experiences of veteran women, and recall that ‘veteran’ is 40 or older. We have conducted a series of interviews. We made several recommendations both to organisations and to veteran women developing software. We recognise that these recommendations are merely band aid solutions applied to systemic issues; however, we hope that in short-term they might help developers to survive in the industry.