summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7704.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc7704.txt')
-rw-r--r--doc/rfc/rfc7704.txt1011
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc7704.txt b/doc/rfc/rfc7704.txt
new file mode 100644
index 0000000..22aba3f
--- /dev/null
+++ b/doc/rfc/rfc7704.txt
@@ -0,0 +1,1011 @@
+
+
+
+
+
+
+Independent Submission D. Crocker
+Request for Comments: 7704 Brandenburg InternetWorking
+Category: Informational N. Clark
+ISSN: 2070-1721 Pavonis Consulting
+ November 2015
+
+
+ An IETF with Much Diversity and Professional Conduct
+
+Abstract
+
+ The process of producing today's Internet technologies through a
+ culture of open participation and diverse collaboration has proved
+ strikingly efficient and effective, and it is distinctive among
+ standards organizations. During the early years of the IETF and its
+ antecedent, participation was almost entirely composed of a small
+ group of well-funded, American, white, male technicians,
+ demonstrating a distinctive and challenging group dynamic, both in
+ management and in personal interactions. In the case of the IETF,
+ interaction style can often contain singularly aggressive behavior,
+ often including singularly hostile tone and content. Groups with
+ greater diversity make better decisions. Obtaining meaningful
+ diversity requires more than generic good will and statements of
+ principle. Many different behaviors can serve to reduce participant
+ diversity or participation diversity. This document discusses IETF
+ participation in terms of the nature of diversity and practical
+ issues that can increase or decrease it. The document represents the
+ authors' assessments and recommendations, following general
+ discussions of the issues in the IETF.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This is a contribution to the RFC Series, independently of any other
+ RFC stream. The RFC Editor has chosen to publish this document at
+ its discretion and makes no statement about its value for
+ implementation or deployment. Documents approved for publication by
+ the RFC Editor are not a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7704.
+
+
+
+
+
+
+Crocker & Clark Informational [Page 1]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+Copyright Notice
+
+ Copyright (c) 2015 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Concerns . . . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 2.1. Diversity . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 2.2. Harassment and Bullying . . . . . . . . . . . . . . . . . 7
+ 3. Constructive Participation . . . . . . . . . . . . . . . . . 11
+ 3.1. Access . . . . . . . . . . . . . . . . . . . . . . . . . 11
+ 3.2. Engagement . . . . . . . . . . . . . . . . . . . . . . . 12
+ 3.3. Facilitation . . . . . . . . . . . . . . . . . . . . . . 12
+ 3.4. Balance . . . . . . . . . . . . . . . . . . . . . . . . . 12
+ 3.5. IETF Track Record . . . . . . . . . . . . . . . . . . . . 13
+ 3.6. Avoiding Distraction . . . . . . . . . . . . . . . . . . 13
+ 4. Responses to Unconstructive Participation . . . . . . . . . . 14
+ 5. Security Considerations . . . . . . . . . . . . . . . . . . . 14
+ 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 15
+ 6.1. Normative References . . . . . . . . . . . . . . . . . . 15
+ 6.2. Informative References . . . . . . . . . . . . . . . . . 15
+ Acknowledgements . . . . . . .. . . . . . . . . . . . . . . . . . 18
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Crocker & Clark Informational [Page 2]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+1. Introduction
+
+ This document discusses IETF participation, in terms of the nature of
+ diversity and practical issues that can increase or decrease it. The
+ topic has received recent discussion in the IETF, and the document
+ represents the authors' assessments and recommendations about it, in
+ the belief that it is constructive for the IETF and that it is
+ consonant with at least some of the IETF community's participants.
+
+ The Internet Engineering Task Force [IETF] grew out of a research
+ effort that was started in the late 1960s, with central funding by
+ the US Department of Defense Advanced Research Projects Agency (ARPA,
+ later DARPA) employing a collection of research sites around the
+ United States, and including some participation by groups of the US
+ military. The community was originally restricted to participation
+ by members of the funded research groups. In the 1980s,
+ participation expanded to include projects funded by other agencies,
+ most notably the US National Science Foundation for its NSFNet
+ effort. At around the time the IETF was created in its current form,
+ in the late 1980s, participation in the group became fully open,
+ permitting attendance by anyone, independent of funding, affiliation,
+ country of origin, or the like.
+
+ Beyond the obvious effects of the resulting technology that we now
+ enjoy, the process of producing today's Internet technologies through
+ a culture of open participation and diverse collaboration has proved
+ strikingly efficient and effective, and it is distinctive among
+ standards organizations. This culture has been sustained across many
+ changes in participant origins, organizational structures, economic
+ cycles, and formal processes. However, maintenance of the IETF's
+ effectiveness requires constant vigilance. As new participants join
+ the IETF mix, it is increasingly easy for the IETF's operation to
+ gradually invoke models from other environments, which are more
+ established and more familiar, but often are less effective.
+
+ Historically, participation in the IETF and its antecedent was almost
+ entirely composed of a small group of well-funded, American, white,
+ male technicians. No matter the intentions of the participants, such
+ a narrow demographic demonstrated a distinctive group dynamic, both
+ in management and in personal interactions, that persists into the
+ current IETF. Aggressive and even hostile discussion behavior is
+ quite common. In terms of management, the IETF can be significantly
+ in-bred, favoring selection of those who are already well-known. Of
+ course, the pool of candidates from which selections are made suffer
+ classic limitations of diversity found in many engineering
+ environments. Still, there is evidence and perception of selection
+ bias, beyond this.
+
+
+
+
+Crocker & Clark Informational [Page 3]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ In the case of the IETF, the style of interaction can often
+ demonstrate singularly aggressive behavior, including singularly
+ hostile tone and content. In most professional venues, such behavior
+ is deemed highly unprofessional, or worse. Within the IETF, such
+ behavior has had long-standing tolerance. Criticizing someone's
+ hostility is dismissed by saying that's just the way they are, or
+ that someone else provoked it, or that the person is generally well-
+ intentioned. Further, anyone expressing concern about the behavior
+ is typically admonished to be less sensitive; that is, a recipient of
+ an attack who then complains is often criticized or dismissed.
+
+ As the IETF opened its doors to participation by anyone, its
+ demographics have predictably moved towards much greater variety.
+ However, the group culture has not adapted to accommodate these
+ changes. The aggressive debating style and the tolerance for
+ personal attacks can be extremely off-putting for participants from
+ more polite cultures. And, the management selection processes can
+ tend to exclude some constituencies inappropriately.
+
+ Recently, members of an informal IETF women's interest group, called
+ "systers", organized a quiet experiment, putting forward a large
+ number of women candidates for management positions, through the
+ IETF's "NomCom" process. NomCom is itself a potentially diverse
+ group of IETF participants, chosen at random from a pool of recent
+ meeting attendees who offer their services. Hence, its problematic
+ choices -- or rather, omissions -- could be seen as reflecting IETF
+ culture generally.
+
+ Over the years, some women have been chosen for IETF positions as
+ authors, working group chairs, area directors, Internet Architecture
+ Board [IAB] members, and IETF Administrative Oversight Committee
+ [IAOC] members. However, the results of the systers experiment were
+ not encouraging. In spite of their recruiting a disproportionately
+ high number of female candidates, not a single one was selected.
+ Although any one candidate might be rejected for entirely legitimate
+ reasons, a pattern of rejection this consistent suggested an
+ organizational bias. The results were presented at an IETF plenary,
+ and they engendered significant IETF soul-searching, as well as
+ creation of a group to consider diversity issues for the IETF
+ [Div-DT] [Div-Discuss].
+
+ Other activities around that same time also engendered IETF
+ consideration of unacceptable behaviors, generally classed as
+ harassment. This resulted in the IESG's issuing a formal IETF anti-
+ harassment policy [Anti-Harass].
+
+
+
+
+
+
+Crocker & Clark Informational [Page 4]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ Changing an organization's culture is difficult and requires not only
+ commitment to the underlying principles, but also vigilant and
+ sustained effort. The IESG has taken essential first steps. What is
+ needed is going beyond the position papers and expression of ideals,
+ into continuing education of the entire community, and immediate and
+ substantive response to unacceptable behaviors.
+
+2. Concerns
+
+2.1. Diversity
+
+ Diversity concerns the variability of a group's composition. It can
+ reasonably touch every conceivable participant attribute. It
+ includes task-related attributes, such as knowledge and experience,
+ as well as the usual range of "identified class" attributes,
+ including race, creed, color, religion, gender and sexual
+ orientation, but also extends to all manner of beliefs, behaviors,
+ experiences, preferences, and economic status.
+
+ The factors affecting the quality of group decision-making are
+ complex and subtle, and are not subject to precise specification.
+ Nevertheless, in broad terms, groups with greater diversity make
+ better decisions [Kellogg]. They perform better at diverse tasks
+ both in terms of quantity and quality, and a great deal of research
+ has found that heterogeneity often acts as a conduit for ideas and
+ innovation [WiseCrowd] [Horowitz] [Stahl] [Joshi]. The implicit
+ assumptions of one participant might not be considerations for
+ another and might even be unknown by still others. And, different
+ participants can bring different bases of knowledge and different
+ styles of analysis. People with the same background and experience
+ will all too readily bring the same ideas forward and subject them to
+ the same analysis, thus diminishing the likelihood for new ideas and
+ methods to emerge, or underlying problems to be noted.
+
+ However, a desire to diligently attend to group diversity often leads
+ to mechanical, statistical efforts to ensure representation by every
+ identified constituency. For smaller populations, like the IETF and
+ especially for its small management teams, this approach is
+ counterproductive. First, it is not possible to identify every
+ single constituency that might be relevant. Second, the group size
+ does not permit representation by every group. Consequently, in
+ practical terms, legitimate representation of diversity only requires
+ meaningful variety, not slavish bookkeeping. In addition, without
+ care, it can lead to the negative effects of diversity where
+ decision-making is slowed, interaction decreased, and conflict
+ increased [Horowitz].
+
+
+
+
+
+Crocker & Clark Informational [Page 5]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ Pragmatically, then, concern for diversity merely requires serious
+ attention to satisfying two requirements:
+
+ Participant Diversity: Decisions about who is allowed into the
+ group require ensuring that the selection process encourages
+ varying attributes among members. That is, this concerns
+ variety in group demographics.
+
+ Participation Diversity: Achieving effective generation of ideas
+ and reviews within a group requires ensuring that its
+ discussions encourage constructive participation by all members
+ and that the views of each member are considered seriously.
+ This, then, concerns group dynamics.
+
+ In other words, look for real variety in group composition and real
+ variety in participant discussion. This will identify a greater
+ variety of possible and practical solutions.
+
+ Obtaining meaningful diversity requires more than generic good will
+ and statements of principle. The challenges, here, are to actively:
+
+ o Encourage constructive diversity
+
+ o Work to avoid group dynamics that serve to reduce diversity
+
+ o Work to avoid group dynamics that serve to diminish the benefits
+ of diversity
+
+ o Remove those dynamics when they still occur
+
+ It also requires education about the practicalities of diversity in
+ an open engineering environment, and it requires organizational
+ processes that regularly consider what effect each decision might
+ have on diversity.
+
+ Examples abound:
+
+ o Formally, an IETF working group makes its decisions on its mailing
+ list. Since anyone can join the list, anyone with access to the
+ Internet can participate. However, working groups also have
+ sessions at the thrice-annual IETF face-to-face meetings and might
+ also hold interim meetings, which are face to face, by telephone,
+ or by video conference. Attendance at these can be challenging.
+ Getting to a face-to-face meeting costs a great deal of money and
+ time; remote participation often incurs time-shifting that
+ includes very early or very late hours. So, increased working
+ group reliance on meetings tends to exclude those with less
+ funding or less travel time or more structured work schedules.
+
+
+
+Crocker & Clark Informational [Page 6]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ o Vigorous advocacy for a strongly held technical preference is
+ common in engineering communities. Of course it can be healthy,
+ since strong support is necessary to promote success of the work.
+ However, in the IETF this can be manifest in two ways that are
+ problematic. One is a personal style that is overly aggressive
+ and serves to intimidate, and hence unreasonably gag, those with
+ other views. The other is a group style that prematurely embraces
+ a choice and does not permit a fair hearing for alternatives.
+
+ o Predictably, engineers value engineering skills. When the task is
+ engineering, this is entirely appropriate. However, many of the
+ IETF's activities, in support of its engineering efforts, are less
+ about engineering and more about human and organizational
+ processes. These require very different skills. To the extent
+ that participants in those processes are primarily considered in
+ terms of their engineering prowess, those who are instead stronger
+ in other, relevant skills will be undervalued, and the diversity
+ of expertise that the IETF needs will be lost.
+
+ o IETF standards are meant to be read, understood, and implemented
+ by people who were not part of the working group process. The
+ gist of the standards also often needs to be read by managers and
+ operators who are not engineers. IETF specifications enjoy quite
+ a bit of stylistic freedom to contain pedagogy, in the service of
+ these audience goals. However, the additional effort to be
+ instructional is significant, and active participants who already
+ understand and embrace the technical details often decline from
+ making that effort. Worse, that effort is also needed during the
+ specification development effort, since many participants might
+ lack the background or superior insight needed to appreciate what
+ is being specified. Yet the IETF's mantra for "rough consensus"
+ is exactly about the need to recruit support. In fact, the
+ process of "educating" others often uncovers issues that have been
+ missed.
+
+2.2. Harassment and Bullying
+
+ Many different behaviors can serve to reduce participant diversity or
+ participation diversity. One class of efforts is based on overt
+ actions to marginalize certain participants by intimidating them into
+ silence or departure. Intimidation efforts divide into two styles
+ warranting distinction. One is harassment, which pertains to biased
+ treatment of demographic classes. A number of identified classes are
+ usually protected by law, and community understanding that such
+ biased behavior cannot be tolerated has progressively improved.
+
+
+
+
+
+
+Crocker & Clark Informational [Page 7]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ Other intimidation efforts are tailored to targeted individuals and
+ are generally labeled bullying [Har-Bul] [Workplace] [Signs]
+ [Escalated] [Prevention]. The nature and extent of bullying in the
+ workplace is widely underestimated, misunderstood, and mishandled.
+ It is described as follows in a WikiHow article [wikiHow]:
+
+ ...[B]ehavior directed at an employee that is intended to degrade,
+ humiliate, embarrass, or otherwise undermine their performance...
+ [T]he sure signs of a bully that signify more than a simple
+ misunderstanding or personal disagreement... might include:
+
+ * Shouting, whether in private, in front of colleagues, or in
+ front of customers
+
+ * Name-calling
+
+ * Belittling or disrespectful comments
+
+ * Excessive monitoring, criticizing, or nitpicking someone's work
+
+ * Deliberately overloading someone with work
+
+ * Undermining someone's work by setting them up to fail
+
+ * Purposefully withholding information needed to perform a job
+ efficiently
+
+ * Actively excluding someone from normal workplace/staff room
+ conversations and making someone feel unwelcome
+
+ In addition, the Tim Field Foundation [Bully-Ser] lists the traits of
+ a "serial bully", paraphrased below:
+
+ o Jekyll and Hyde nature -- Dr Jekyll is 'charming' and
+ 'charismatic'; 'Hyde' is 'evil'
+
+ o Exploits the trust and needs of organizations and individuals, for
+ personal gain
+
+ o Convincing liar -- Makes up anything to fit their needs at that
+ moment
+
+ o Damages the health and reputations of organizations and
+ individuals
+
+ o Reacts to criticism with Denial, Retaliation, Feigned Victimhood
+ [Defensive], [MB-Misuse]
+
+
+
+
+Crocker & Clark Informational [Page 8]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ o Blames victims
+
+ o Apparently immune from disciplinary action
+
+ o Moves to a new target when the present one burns out
+
+ Whether directed at classes or individuals, intimidation methods used
+ can:
+
+ o Seem relatively passive, such as consistently ignoring a member
+
+ o Seem mild, such as with a quiet tone or language of condescension
+
+ o Be quite active, such as aggressively attacking what is said by
+ the participant
+
+ o Be disingenuous, masking attacks in a passive-aggressive style
+
+ If tolerated by others, and especially by those managing the group,
+ these methods create a hostile work environment [Dealing].
+
+ When public harassment or bullying is tolerated, the hostile
+ environment is not only for the person directly subject to the
+ attacks.
+
+ The harassment also serves to intimidate others who observe that
+ it is tolerated. It teaches them that misbehaviors will not be
+ held accountable.
+
+ The IETF's Anti-Harassment Policy [Anti-Harass] uses a single term to
+ cover the classic harassment of identified constituencies, as well as
+ the targeted behavior of bullying. The policy's text is therefore
+ comprehensive, defining unacceptable behavior as "unwelcome hostile
+ or intimidating behavior." Further, it declares: "Harassment of this
+ sort will not be tolerated in the IETF." An avenue for seeking
+ remedy when harassment occurs is specified as a designated
+ Ombudsperson.
+
+ Unified handling of bullying and harassment is exemplified in the
+ policies of many different organizations, notably including those
+ with widely varying membership, even to the point of open,
+ international participation, similar to that of the IETF. Examples
+ include:
+
+ Scouts Canada:
+ Bullying/Harassment Policy [SC-Cybul]
+
+
+
+
+
+Crocker & Clark Informational [Page 9]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ IEEE:
+ Code of Conduct [IEEE-Cybul]
+
+ Facebook:
+ Community Standards [F-H-Cybul]
+
+ LinkedIn:
+ "Be Nice" in LinkedIn Professional Community Guidelines
+ [L-H-Cybul]
+
+ YouTube:
+ Harassment and cyberbullying [Y-H-Cybul]
+
+ NetHui:
+ Kaupapa and code of conduct [NetHui]
+
+ GeekFeminism:
+ Conference anti-harassment: Adopting a policy [GeekFeminism]
+
+ In fact, there is a view that harassment is merely a form of
+ bullying, given the same goal of undermining participation by the
+ target:
+
+ Sexual harassment is bullying or coercion of a sexual nature...
+ [Wiki-SexHarass]
+
+ The IETF has a long history of tolerating aggressive and even hostile
+ behavior by participants. So, this policy signals a formal and
+ welcome change. The obvious challenge is to make the change real,
+ moving the IETF from a culture that tolerates -- or even encourages
+ -- interpersonal misbehaviors to one that provides a safe,
+ professional, and productive haven for its increasingly diverse
+ community.
+
+ Here again, examples abound, to the present:
+
+ o Amongst long-time colleagues, acceptable interpersonal style can
+ be whatever the colleagues want, even though it might look quite
+ off-putting to an observer. The problem occurs when an IETF
+ participant engages in such behaviors with, or in the presence of,
+ others who have not agreed to the social contract of that
+ relationship style and might not even understand it. For these
+ others, the behavior can be extremely alienating, creating a
+ disincentive against participation. Yet, in the IETF, it is
+ common for participants to feel entitled to behave in overly
+ familiar or aggressive or even hostile fashion that might be
+ acceptable amongst colleagues, but is destructive with strangers.
+
+
+
+
+Crocker & Clark Informational [Page 10]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ o The instant a comment is made that concerns any attribute of a
+ speaker, such as their motives, the nature of their employer, or
+ the quality of their participation style, the interaction has
+ moved away from technical evaluation. In many cultures, all such
+ utterances are intimidating or offensive. In an open,
+ professional participation environment, they therefore cannot be
+ permitted.
+
+ o As a matter of personal style or momentary enthusiasm, it is easy
+ to indulge in condescending or dismissive commentary about
+ someone's statements. As a discussion technique, its function is
+ to attempt to reduce the target's influence on the group. Whether
+ nonverbal (such as rolling one's eyes), paternalistic (such as
+ noting the target's naivete), or overtly hostile (such as
+ impugning the target's motives), it is an attempt to marginalize
+ the person rather than focus on the merits of what they are
+ saying. It constitutes harassment or bullying.
+
+3. Constructive Participation
+
+ The goal of open, diverse participation requires explicit and ongoing
+ organizational effort, concerning group access, engagement, and
+ facilitation.
+
+3.1. Access
+
+ Aiding participants with access to IETF materials and discussions
+ means that it is easy for them to:
+
+ o Know what exists
+
+ o Find what is of interest
+
+ o Retrieve documents or gain access to discussions
+
+ o Be able to understand the content
+
+ After materials and discussions are located, the primary means of
+ making it easy to access the substance of the work is for statements
+ to be made in language that is clear and explanatory. Writers and
+ speakers need to carefully consider the likely audience and package
+ statements accordingly. This often means taking a more tutorial
+ approach than one might naturally choose. In speech, it means
+ speaking more deliberately, a bit more clearly and a bit more slowly
+ than needed with close collaborators. When language is cryptic or
+ filled with linguistic idiosyncrasies and when speech is too fast, it
+ is dramatically less accessible to a diverse audience.
+
+
+
+
+Crocker & Clark Informational [Page 11]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+3.2. Engagement
+
+ Once content is accessible, the challenge is to garner diverse
+ contribution for further development. Engagement means that it is
+ easy for constructive participants to be heard and taken seriously
+ through constructive interaction.
+
+ Within the IETF, the most common challenge is choosing how to respond
+ to comments. The essence of the IETF is making proposals and
+ offering comments on proposals; disagreement is common and often
+ healthy, depending upon the manner in which disagreement is pursued.
+
+3.3. Facilitation
+
+ In order to obtain the best technology, the best ideas need first to
+ be harvested. Processes that promote free-ranging discussion, tease
+ out new ideas, and tackle concerns should be promoted. This will
+ also run to:
+
+ o Encouraging contributions from timid speakers
+
+ o Showing warmth for new contributors
+
+ o Preventing dominance by, or blind deference to, those perceived as
+ the more senior and authoritative contributors
+
+ o Actively shutting down derogatory styles
+
+ It is important that participants be facilitated in tendering their
+ own ideas readily so that innovation thrives.
+
+3.4. Balance
+
+ There is the larger challenge of finding balance between efforts to
+ facilitate diversity versus efforts to achieve work goals. Efforts
+ to be inclusive include a degree of tutorial assistance for new
+ participants. They also include some tolerance for participants who
+ are less efficient at doing the work. Further, not everyone is
+ capable of being constructive, and the burdens of accommodating such
+ folk can easily become onerous.
+
+ As an example, there can be tradeoffs with meeting agendas. There is
+ common pushback on having working group meetings be a succession of
+ presentations. For good efficiency, participants want to have just
+ enough presentation to frame a question, and then spend face-to-face
+ time in discussion. However, "just enough presentation" does not
+
+
+
+
+
+Crocker & Clark Informational [Page 12]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ leave much room for tutorial commentary to aid those new to the
+ effort. Meeting time is always too short, and the primary
+ requirement is to achieve forward progress.
+
+3.5. IETF Track Record
+
+ The IETF's track record for making its technical documents openly
+ available is notably superb, as is its official policy of open
+ participation in mailing lists and meetings. Its track record with
+ management and process documentation is more varied, partly because
+ these cover overhead functions, rather than being in the main line of
+ IETF work and, therefore, expertise. So, they do not always get
+ diligent attention. Factors include the inherent challenges in doing
+ management by engineers, as well as challenges in making management
+ and process documents usable for non-experts and non-native English
+ speakers.
+
+ On the surface, the IETF's track record for open access and
+ engagement therefore looks astonishingly good, since there is no
+ "membership", and anyone is permitted to join IETF mailing lists and
+ attend IETF meetings. Indeed, for those with good funding, time for
+ travel, and skills at figuring out the IETF culture, the record
+ really does qualify as excellent.
+
+ However, very real challenges exist for those who have funding,
+ logistics, or language limitations. In particular, these impede
+ attendance at meetings. Another challenge is for those from more
+ polite cultures who are alienated by the style of aggressive debate
+ that is popular in the IETF.
+
+3.6. Avoiding Distraction
+
+ For any one participant, some other participant's contributions might
+ be considered problematic, possibly having little or no value.
+ Worse, some contributions are in a style that excites a personal,
+ negative reaction.
+
+ The manner chosen for responding to such contributions dramatically
+ affects group productivity. Attacking the speaker's style or motives
+ or credentials is not useful, and primarily serves to distract
+ discussion from matters of substance. In the face of such challenges
+ and among the many possible ways to pursue constructive exchange,
+ guidance includes:
+
+ o Ignore such contributions; perhaps someone else can produce a
+ productive exchange, but there is no requirement that anyone
+ respond.
+
+
+
+
+Crocker & Clark Informational [Page 13]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ o Respond to the content, not the author; in the extreme, literally
+ ignore the author and merely address the group about the content.
+
+ o Offer better content, including an explanation of the reasons it
+ is better.
+
+ The essential point here is that the way to have a constructive
+ exchange about substance is to focus on the substance. The way to
+ avoid getting distracted is to ignore whatever is personal and
+ irrelevant to the substance.
+
+4. Responses to Unconstructive Participation
+
+ Sometimes problematic participants cannot reasonably be ignored.
+ Their behavior is too disruptive, too offensive, or too damaging to
+ group exchange. Any of us might have a moment of excess, but when
+ the behavior is too extreme or represents a pattern, it warrants
+ intervention.
+
+ A common view is that this should be pursued personally, but for such
+ cases, it rarely has much effect. This is where IETF management
+ intervention is required. The IETF now has a reasonably rich set of
+ policies concerning problematic behavior. So, the requirement is
+ merely to exercise the policies diligently. Depending on the
+ details, the working group chair, mailing list moderator,
+ Ombudsperson, or perhaps IETF Chair is the appropriate person to
+ contact [MlLists] [Anti-Harass].
+
+ The challenge, here, is for both management and the rest of the
+ community to collaborate in communicating that harassment and
+ bullying will not be tolerated. The formal policies make that
+ declaration, but they have no meaning unless they are enforced.
+
+ Abusive behavior is easily extinguished. All it takes is community
+ resolve.
+
+5. Security Considerations
+
+ The security of the IETF's role in the Internet community depends
+ upon its credibility as an open and productive venue for
+ collaborative development of technical documents. More diverse
+ scrutiny leads to increased rigor, so the quality of technical
+ documents will potentially improve. The potential for future legal
+ liability in the various jurisdictions within which the IETF operates
+ also indicates a need to act to reinforce behavioral policies with
+ specific attention to workplace safety.
+
+
+
+
+
+Crocker & Clark Informational [Page 14]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+6. References
+
+6.1. Normative References
+
+ [Anti-Harass]
+ IESG, "IETF Anti-Harassment Policy", November 2013,
+ <https://www.ietf.org/iesg/statement/
+ ietf-anti-harassment-policy.html>.
+
+ [MlLists] IESG, "IESG Guidance on the Moderation of IETF Working
+ Group Mailing Lists", August 2000,
+ <https://www.ietf.org/iesg/statement/
+ moderated-lists.html>.
+
+6.2. Informative References
+
+ [Bully-Ser]
+ Tim Field Foundation, "Introduction to the Serial Bully:
+ Serial Bully Traits", <http://bullyonline.org/workbully/
+ serial_introduction.htm>.
+
+ [Dealing] Government of South Australia, "Dealing with Workplace
+ Bullying: A practical guide for employees", Interagency
+ Round Table on Workplace Bullying, South Australia, 2007,
+ <https://crana.org.au/uploads/pdfs/
+ SAgov_bullying_employees.pdf>.
+
+ [Defensive]
+ Bickham, I., "Defensive Communication",
+ <http://www.people-communicating.com/
+ defensive-communication.html>.
+
+ [Div-Discuss]
+ IETF, "Diversity Discussion List", <http://www.ietf.org/
+ mail-archive/web/diversity/current/maillist.html>.
+
+ [Div-DT] IETF, "Diversity Design Team wiki", 2013,
+ <https://wiki.tools.ietf.org/group/diversity-dt/>.
+
+ [Escalated]
+ Namie, G., "Workplace bullying: Escalated incivility",
+ Ivey Business Journal 9B03TF09, November/December 2003.
+
+ [F-H-Cybul]
+ Facebook, "Community Standards", 2015,
+ <https://www.facebook.com/communitystandards>.
+
+
+
+
+
+Crocker & Clark Informational [Page 15]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ [GeekFeminism]
+ Geek Feminism Wiki, "Conference anti-harassment: Adopting
+ a policy", <http://geekfeminism.wikia.com/wiki/
+ Conference_anti-harassment>.
+
+ [Har-Bul] UK Chartered Institute of Personnel and Development,
+ "Harassment and bullying at work", January 2015,
+ <http://www.cipd.co.uk/hr-resources/factsheets/
+ harassment-bullying-at-work.aspx>.
+
+ [Horowitz] Horwitz, S. and I. Horwitz, "The Effects of Team Diversity
+ on Team Outcomes: A Meta-Analytic Review of Team
+ Demography", Journal of Management, Vol. 33 (6),
+ p. 987-1015, DOI 10.1177/0149206307308587, December 2007.
+
+ [IAB] "Internet Architecture Board", <https://www.iab.org/>.
+
+ [IAOC] "IETF Administrative Oversight Committee (IAOC)",
+ <https://iaoc.ietf.org/>.
+
+ [IEEE-Cybul]
+ IEEE, "IEEE CODE OF CONDUCT", June 2014,
+ <https://www.ieee.org/about/ieee_code_of_conduct.pdf>.
+
+ [IETF] IETF, "The Internet Engineering Task Force",
+ <https://www.ietf.org/>.
+
+ [Joshi] Joshi, A. and H. Roh, "The Role of Context in Work Team
+ Diversity Research: A Meta-Analytic Review", Academy of
+ Management Journal, Vol. 52, No. 3, 599-627,
+ DOI 10.5465/AMJ.2009.41331491, 2009,
+ <http://www.ilo.bwl.uni-muenchen.de/download/
+ unterlagen-ws1415/josh-roh-2009.pdf>.
+
+ [Kellogg] Kellogg Insight, "Better Decisions Through Diversity:
+ Heterogeneity can boost group performance", Kellogg School
+ of Management, Northwestern University, Oct 2010,
+ <http://insight.kellogg.northwestern.edu/article/
+ better_decisions_through_diversity>.
+
+ [L-H-Cybul]
+ LinkedIn, "LinkedIn Professional Community Guidelines",
+ 2015,
+ <https://help.linkedin.com/app/answers/detail/a_id/34593>.
+
+
+
+
+
+
+
+Crocker & Clark Informational [Page 16]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ [MB-Misuse]
+ Rachel Burger, R., "Three Common Ways Libertarians Misuse
+ Myers-Briggs Part 2: Misunderstanding the Feeling
+ Preference", July 2013, <http://thoughtsonliberty.com/
+ three-common-ways-libertarians-misuse-myers-briggs-part-2-
+ misunderstanding-the-feeling-preference>.
+
+ [NetHui] InternetNZ, "Kaupapa and code of conduct", NetHui 2015,
+ <http://2015.nethui.nz/code-of-conduct>.
+
+ [Prevention]
+ WorkSafe Victoria, "Workplace bullying - prevention and
+ response", October 2012,
+ <http://www.worksafe.vic.gov.au/__data/assets/
+ pdf_file/0008/42893/WS_Bullying_Guide_Web2.pdf>.
+
+ [SC-Cybul] Scouts Canada, "Bullying/Harassment Policy", May 2012,
+ <http://www.scouts.ca/cys/
+ policy-bullying-and-harassment.pdf>.
+
+ [Signs] Workplace Bullying Institute, "Employee Resource Council:
+ 20 Subtle Signs of Workplace Bullying", November 2013,
+ <http://www.workplacebullying.org/2013/11/10/erc/>.
+
+ [Stahl] Stahl, G., Maznevski, M., Voigt, A., and K. Jonsen,
+ "Unraveling the effects of cultural diversity in teams: A
+ meta-analysis of research on multicultural work groups",
+ Journal of International Business Studies 41, 690-709,
+ DOI 10.1057/jibs.2009.85, May 2010,
+ <http://www.palgrave-journals.com/jibs/journal/v41/n4/
+ full/jibs200985a.html>.
+
+ [Wiki-SexHarass]
+ Wikipedia, "Sexual harassment", November 2015,
+ <https://en.wikipedia.org/w/
+ index.php?title=Sexual_harassment&oldid=689426449>.
+
+ [wikiHow] WikiHow, "How to Deal with Workplace Bullying and
+ Harassment", November 2015, <http://www.wikihow.com/
+ index.php?title=Deal-with-Workplace-Bullying-and-
+ Harassment&oldid=18828395>.
+
+ [WiseCrowd]
+ Wikipedia, "The Wisdom of Crowds", November 2015,
+ <https://en.wikipedia.org/w/
+ index.php?title=The_Wisdom_of_Crowds&oldid=689201384>.
+
+
+
+
+
+Crocker & Clark Informational [Page 17]
+
+RFC 7704 Diversity & Conduct November 2015
+
+
+ [Workplace]
+ "Workplace Bullying", YouTube video, 12:30, posted
+ by "QualiaSoup", February 2013,
+ <http://www.youtube.com/watch?v=wAgg32weT80>.
+
+ [Y-H-Cybul]
+ Google, "Harassment and cyberbullying - YouTube Help",
+ 2015, <https://support.google.com/youtube/
+ answer/2801920?hl=en&rd=1>.
+
+Acknowledgements
+
+ This document was prompted by the organizational change, signaled
+ with the IESG's adoption of an anti-harassment policy for the IETF,
+ and a number of follow-on activities and discussions that ensued. A
+ few individuals have offered thoughtful comments during private
+ discussions.
+
+ Comments on the original draft were provided by John Border and SM
+ (Subramanian Moonesamy).
+
+Authors' Addresses
+
+ Dave Crocker
+ Brandenburg InternetWorking
+ 675 Spruce Drive
+ Sunnyvale, CA 94086
+ United States
+
+ Phone: +1.408.246.8253
+ Email: dcrocker@bbiw.net
+
+
+ Narelle Clark
+ Pavonis Consulting
+ C/- PO Box 1705
+ North Sydney, NSW 2059
+ Australia
+
+ Phone: +61 412297043
+ Email: narelle.clark@pavonis.com.au
+
+
+
+
+
+
+
+
+
+
+Crocker & Clark Informational [Page 18]
+