Women Write Better Computer Code Than Men

Computer code written by women has a higher approval rating than that written by men - but only if their gender is not identifiable, new research suggests.

The US researchers analysed nearly 1.4 million users of the open source program-sharing service Github.

They found that pull requests, or suggested code changes, made on the service by women were more likely to be accepted than those by men. The paper is awaiting peer review.This means the results have yet to be critically appraised by other experts.

The researchers, from the computer science departments at Caly Poly and North Carolina State University, looked at around four million people who logged on to Github on a single day - 1 April 2015.

Github is an enormous developer community, which does not request gender information from its 12 million users.

However the team was able to identify whether roughly 1.4m were male or female - either because it was clear from the users' profiles or because their email addresses could be matched with the Google + social network.

The researchers accepted that this was a privacy risk but said they did not intend to publish the raw data. The researchers found women fared better if their gender was not clear. The team found that 78.6% of pull requests made by women were accepted compared with 74.6% of those by men.

The researchers considered various factors, such as whether women were more likely to be responding to known issues, whether their contributions were shorter in length and so easier to appraise, and which programming language they were using, but they could not find a correlation.

However among users who were not well known within the community, those whose profiles made clear that they were women had a much lower acceptance rate than those whose gender was not obvious.

'Bias nonetheless'

"For outsiders, we see evidence for gender bias: women's acceptance rates are 71.8% when they use gender neutral profiles, but drop to 62.5% when their gender is identifiable. There is a similar drop for men, but the effect is not as strong," the paper noted.

"Women have a higher acceptance rate of pull requests overall, but when they're outsiders and their gender is identifiable, they have a lower acceptance rate than men.

"Our results suggest that although women on Github may be more competent overall, bias against them exists nonetheless," the researchers concluded.

Despite various high profile initiatives, tech firms continue to face challenges in terms of the diversity of their staff, in terms of both gender and ethnicity, particularly in more technical careers.

Just 16% of Facebook's tech staff and 18% of Google's are women according to figures released in 2015.

However the researchers' findings are still encouraging, computer scientist Dr Sue Black OBE told the BBC.

"I think we are going to see a resurgence of interest from women in not only coding but all sorts of tech-related careers over the next few years," she said. "Knowing that women are great at coding gives strength to the case that it's better for everyone to have more women working in tech.

"It was a woman - Ada Lovelace - who came up with the idea of software in the first place, we owe it to her to make sure that we encourage and support women into the software industry," Dr Black added.

BBC:

« Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next U.S. President
Data Security – The Trends We Do Not See Coming »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.

Digital & Intelligence Service (DIS) - Singapore

Digital & Intelligence Service (DIS) - Singapore

DIS is the fourth Service of the SAF, here to defend and dominate in the digital domain, and achieve peace and security for our land.

AccuKnox

AccuKnox

Our Cloud-Native Application Protection Platform (CNAPP) delivers uncompromising Zero Trust security, powered by kernel-level precision and AI-driven innovation, to protect your workloads.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.

Seamfix

Seamfix

Seamfix helps businesses and their customers globally to seamlessly create, verify and access trusted digital identities and services.