{"id":206,"date":"2011-06-13T22:55:15","date_gmt":"2011-06-14T02:55:15","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/dlarochelle\/?p=206"},"modified":"2011-06-13T22:55:15","modified_gmt":"2011-06-14T02:55:15","slug":"sexism-in-information-technology","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/2011\/06\/13\/sexism-in-information-technology\/","title":{"rendered":"Sexism in Information Technology"},"content":{"rendered":"<p>I was recently at a technical presentation that has me wondering about the state of the information technology industry (IT). This presentation was the most extreme example I\u2019ve seen of inappropriate and sexism content. It presented women as sex objects more blatantly than any other presentation I\u2019ve seen and contained content that could have been seen as trivializing violence against woman. I can\u2019t imagine that any reasonable person would attempt to justify this type of content and I\u2019m not sure what the speaker was thinking to create a presentation that so clearly crossed the line. However, I\u2019m more concerned about what it says about our industry that he has a customer facing position on a recognizable product.<\/p>\n<p>It\u2019s possible that this presentation was just an unfortunate outliner. I can\u2019t recall another presentation that I\u2019ve seen at any tech event or conference that came close to this level of inappropriateness. I also don\u2019t have any reason to believe that the attendees approved of the content. In fact, when I contacted the head of the group afterwards, he fully agreed that the presentation was inappropriate and he will now tell future speakers that their presentations cannot contain offensive content. It would be wrong to overly generalize based on a single event however, it\u2019s worth noting that geekfeminism has a long list of other <a href=\"http:\/\/geekfeminism.wikia.com\/wiki\/Porny_presentation\">inappropriate presentations<\/a>.<\/p>\n<p>Within IT, we have an affection for the socially inept nerd stereotype. Some have said that we value brilliance or apparent brilliance above all else often with dire consequences. (See, for example,   <a href=\"http:\/\/itmanagement.earthweb.com\/features\/article.php\/3810466\/Are-Quirky-Developers-Brilliant-or-Dangerous.htm\">Are Quirky Developers Brilliant or Dangerous?<\/a> and its Slashdot <a href=\"http:\/\/developers.slashdot.org\/story\/09\/03\/16\/1355203\/Are-Quirky-Developers-Brilliant-Or-Dangerous\">discussion<\/a>.) However, this speaker projected the faux macho persona of a high school or middle school locker room rather than the traditional nerd stereotype. Furthermore, socially inept but \u201cbrilliant\u201d engineers are usually kept away from customers. But this individual is product evangelist for a recognizable project. (The speaker seemed to be giving the presentation for himself and not for his company but his company\u2019s product was mentioned prominently in the introduction.) I can only suppose that this individual is socially aware enough to restraint himself in a work context. However, there is also the more disturbing possibility that he deals with mostly male customers who tolerate this type of behavior.<\/p>\n<p>Unlike some other types of socially unacceptable behavior, sexist and offensive content can have real consequences. Although this presentation was not typical of the group, first time attendees might not realize that. It is likely that some audience members of both genders were uncomfortable with the talk and will not attend the next event. The hosting organization has a program to recruit more women members. I didn\u2019t get a chance to talk to any of the women in attendance and will not attempt to speak for them here. However, the content was certainly not consistent with a policy of promoting gender diversity. More importantly, presentations like this don\u2019t just reflect badly on the speaker. This type of unprofessionalism can tarnish everything associated with it &#8212; the event, the organization, the attendees, and the community as a whole.<\/p>\n<p>Like it or not, communities are often judged by their most visible and flamboyant members. There are always individuals whose conduct does not reflect that of the broader community. The way the  community responds to these individualise determines how it is viewed. Those outside the community often view silence and a failure to set and enforce behavioral norms as tacit approval or they may simply think that the behavior of these individuals reflects that of the broader community. It certainly does not reflect well on us that this speaker has a public position within the industry. It is important that we set a higher standard not just for reasons of community growth and inclusively but also to protect our own reputation. We must not allow the offensive and unprofessional conduct of a few individuals to be seen as representative of our community as a whole.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was recently at a technical presentation that has me wondering about the state of the information technology industry (IT). This presentation was the most extreme example I\u2019ve seen of inappropriate and sexism content. It presented women as sex objects &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/2011\/06\/13\/sexism-in-information-technology\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2148,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-206","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/posts\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/users\/2148"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":9,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":215,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/posts\/206\/revisions\/215"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/media?parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/categories?post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/tags?post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}