Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source Communities
Abstract
References
Index Terms
- Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source Communities
Recommendations
Gender and Participation in Open Source Software Development
CSCWOpen source software represents an important form of digital infrastructure as well as a pathway to technical careers for many developers, but women are drastically underrepresented in this setting. Although there is a good body of literature on open ...
The role of gender and sexism in the moral disengagement mechanisms of technology-facilitated sexual violence
AbstractTechnology-facilitated sexual violence (TFSV) encompasses various harmful online behaviors, such as online gender-based hate speech, online gender-based violence, digital sexual harassment, image-based sexual abuse, and online sexual coercion. ...
Highlights- Moral disengagement varies depending on the type of TFSV.
- Situations in which the perpetrator is a woman and the victim is a man receive more justification than their counterparts.
- Men justify TFSV to a greater extent than do ...
Code reviews in open source projects : how do gender biases affect participation and outcomes?
AbstractContextContemporary software development organizations lack diversity, and the ratios of women in Free and Open-Source Software (FOSS) communities are even lower than the industry average. Although the results of recent studies hint at the ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 170Total Downloads
- Downloads (Last 12 months)66
- Downloads (Last 6 weeks)12
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format