Keith Miller Peer-Reviewed Publications
- M. Wolf, F. Grodzinsky, and K. Miller (2024). Generative AI and Its Implications for Definitions of Trust. Information,15(9), 542.
- J. Voas and K. Miller (2024). Algorithms as Defendants? IEEE Computer, 57, 7, 11-14.
- D. Gotterbarn and K. W. Miller (2024). Cui Bono? Software Professionals Should Always Ask “Who Benefits?” IEEE Computer,57, 2, 64-69.
- F. Grodzinsky, M. Wolf, and K. Miller (2024). Ethical Issues from Emerging AI Applications: Harms are Happening. IEEE Computer. 57, 2, vol. 57, 44-52.
- N. Kshetri, K. Miller, G. Banerjee, B. Upreti (2023) FinChain: Adaptation of Blockchain Technology in Finance and Business-An Ethical Analysis of Applications, Challenges, Issues and Solutions. International Journal of Emerging and Disruptive Innovation in Education: VISIONARIUM. 1 , 1, Article 4. https://digitalcommons.lindenwood.edu/ijedie/vol1/iss1/4/
- K. Miller (2023). Computer-Enhanced Communication Among Deaf, Hard of Hearing, and Hearing People, IEEE Computer, 56 , 7, pp. 101-105.
- K. Miller (2023). Facial Recognition Technology: Navigating the Ethical Challenges, IEEE Computer, 56, 1, 76-81.
- F. Grodzinsky, K. Miller, and M. Wolf (2022). Session replay scripts: A privacy analysis. The Information Society, 38 , 4, 257-268.
- N. Kshetri and K. Miller (2022). The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weaponry: Enhancing Security or Increasing Threats? An Ethical Analysis, International Research Journal of Engineering and Technology, 9, 10, 823-832.
- K. Miller, D. Johnson and P. Drake (2022). The ConnectionRoom: A New Analogy for Understanding the Ethical Dimensions of Social Media, IEEE Computer, 55,(1), 74-81.
- J. Voas and K. Miller (2021). Confronting your Digital Accuser. IEEE Computer, 54(04), 11-13.
- Borenstein, J., Grodzinsky, F. S., Howard, A., Miller, K. W., & Wolf, M. J. (2021). AI Ethics: A Long History and a Recent Burst of Attention. IEEE Computer, 54(01), 96-102.
- Mardi, F., Miller, K., & Balcerzak, P. (2021, March). Novice-expert pair coaching: Teaching Python in a pandemic. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (pp. 226-231).
- J. Herkert, J. Borenstein, & K. Miller (2020). The Boeing 737 MAX: lessons for engineering ethics. Science and engineering ethics, 26: 2957–2974.
- J. Borenstien, J. Herkert, and K. Miller (2020) Autonomous vehicles and the ethical tension between occupant and non-occupant safety. Journal of Sociotechnical Critique. Vol. 1 : No. 1 , Article 1. Available at: https://digitalcommons.odu.edu/sociotechnicalcritique/vol1/iss1/1
- F. Grodzinsky, K. Miller, and M. Wolf (2020, submitted) Session replay scripts: an ethical analysis. The Information Society.
- Wolf, M. J., Miller, K. W., & Grodzinsky, F. S. (2019). On the responsibility for uses of downstream software. In D. Wittkower (Ed.), 2019 Computer Ethics – Philosophical Enquiry (CEPE) Proceedings, (14 pp.).
- J. Borenstien, J. Herkert, and K. Miller. (2019). Self-driving cars and engineering ethics: The need for a system level analysis. Science and Engineering Ethics, 25 (2), 383-398.
- D. Gotterbarn, M.Wolf, C. Flick, K.Miller (2018). Thinking professionally: The continual evolution of interest in computing ethics. ACM Inroads, 9(2), 10-12.
- D. Larson and K. Miller (2018). Action ethics – testing and data analysis. ACM Inroads, 9(1), 34-37.
- D. Gotterbarn, A. Bruckman, C. Flick, K. Miller, M. Wolf (2018). ACM Code of Ethics: A guide for positive action. Communications of the ACM, 61(1), 121-128.
- D. Gotterbarn and K. Miller (2017). Yes, but… our response to:“Professional ethics in the information age.” Journal of Information, Communication and Ethics in Society, 15.4: 357-361..
- J. Borenstein, J. Herkert, and K. Miller (2017) Self-Driving Cars and Engineering Ethics: The Need for a System Level Analysis. Science and Engineering Ethics. 1-16.
- S. Rogerson, K. Miller, J. Sunrise Winter, and D. Larson. Information systems ethics–challenges and opportunities. Journal of Information, Communication and Ethics in Society (2017).
-
Brinkman, B., Flick, C., Gotterbarn, D., Miller, K., Vazansky, K., & Wolf, M. J. (2017). Dynamic Technology Challenges Static Codes of Ethics. ORBIT Journal, 1(2).
-
M. J. Wolf, K. Miller, and F. S. Grodzinsky. (2017) Why we should have seen that coming: comments on Microsoft’s Tay “experiment,” and wider implications. SIGCAS Comput. Soc. 47, 3, 54-64.
- J. Borenstein, J. Herkert, and K. Miller. Self-driving cars and the ethical responsibilities of design engineers. (2017) IEEE Technology and Society, 67-75.
- B. Brinkman, C.Flick, D. Gotterbarn, K. Miller, K. Vazansky, and M. Wolf. Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. (2017) Communications of the ACM 60, 5, 105-111.
- D. Larson and K. Miller. Action ethics for a software development class. (2017) ACM Inroads, 8, 1: 38-42 .
- Miller, Keith W., Marty J. Wolf, and Frances Grodzinsky. (2017) This “Ethical Trap” Is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision-Making. Science and engineering ethics 23, 2: 389-401.
- B. Brinkman, D. Gotterbarn, K. Miller, and M. Wolf. (2016) Making a positive impact: updating the ACM code of ethics. Communications of the ACM 59, 12, 7-13.
- B. Brinkman, D. Gotterbarn, K. Miller, and M. Wolf. (2016), All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity. SIGCAS Comput. Soc. 46, 3: 5-8.
- B. Spielman, C. Gorka, K. Miller, C. Pointer, and B. Hinze, Gender and Race in the Timing of Requests for Ethics Consultations: A Single-Center Study (2016) The Journal of Clinical Ethics. 27, 2: 154-162.
- M. Wolf, F. Grodzinsky, and K. Miller. (2016), There’s something in your eye: ethical implications of augmented visual field devices. Journal of Information, Communication and Ethics in Society 14.3: 214-230.
- Wolf M.J., Grodzinsky F., Miller K.W. (2016) Robots, Ethics and Software – FOSS vs. Proprietary Licenses. In: Müller V. (eds) Computing and Philosophy. Synthese Library (Studies in Epistemology, Logic, Methodology, and Philosophy of Science), vol 375. Springer.
- M.Wolf, F.Grodzinsky, and K. Miller (2016). Augmented reality all around us: power and perception at a crossroads. SIGCAS Comput. Soc. 45, 3 : 126-131.
- B. Spielman, J. Craig, C. Gorka, and K. Miller (2015). Case complexity and quality attestation for clinical ethics consultants, Journal of Clinical Ethics, 26, 3: 231-240.
- F. Grodzinsky, K. Miller, and M. Wolf. Developing automated deceptions and the impact on trust. Philosophy & Technology. Vol. 28, No. 1 (2015), 91-105.
- M. Lemke and K. Miller. On robots as genetically modified invasive species. Journal of Information, Communication & Ethics in Society, Vol. 12, No. 2 (2014), 122 – 132.
- K. Miller and D. Larson. Measuring a distance: Humans, cyborgs, and robots. APA Newsletter on Philosophy and Computers (Fall 2013), 20-24.
- K. Michael and K. Miller. Big data: New opportunities and new challenges. IEEE Computer, Vol. 46, No. 6 (June 2013), 22-24.
- J. Borenstein and K. Miller. Robots and the Internet: Causes for concern. IEEE Technology & Society¸ Vol. 32, No. 1 (Spring 2013), 60-65.
- F. S. Grodzinsky, K. Miller, and M. J. Wolf. Moral responsibility for computing artifacts: “the rules” and issues of trust. SIGCAS Comput. Soc. (2012), Vol. 42, No. 2 , 15-25.
- K. W. Miller, J. Voas and G. F. Hurlburt, BYOD (2012), Security and Privacy Considerations, IT Professional, 14 (5), 53-55.
- G. Hurlburt, J. Voas, and K. Miller. The Internet of things: a reality check. IT Professional, Vol. 13, No. 3 (May/June 2012), 56-59.
- F. Grodzinsky, K. Miller and M. Wolf. Developing artificial agents worthy of trust: “Would you buy a used car from this artificial agent?” Ethics and Information Technology, Vol. 13, No. 1 (March 2011), 17-27.
- S. Rogerson and K. Miller. Responsibilities in product creation. IMIS Journal, Vol. 21, No. 1 (March 2011), 36-37.
- P. Laplante, G. Hurlburt, K. Miller, and J. Voas. Certainty through uncertainty? IEEE Computer, Vol.44, No.2 (Feb. 2011), 79-81.
- G. Hulburt, J. Voas, K. Miller, P. Laplante and B. Michael. A non-linear perspective on higher education. IEEE Computer, Vol.43, No.12 (Dec. 2010), 90-92.
- K. Miller, J. Voas, and P. Laplante. In trust we trust. IEEE Computer, Vol. 43, No. 10 (October 2010), 85-87.
- K. Miller, J. Voas, and T. Costello. Free and open source software. IT Professional, Vol. 12, No. 6, 14-16.
- M. Wolf, K. Miller and F. Grodzinsky. On the meaning of Free Software. Ethics and Information Technology, Vol. 11, No. 4 (December 2009), 279-286.
- D. Larson and K. Miller. Ethics in the IT classroom: Why and how? Journal of Information Ethics, Vol. 18, No. 2 (Fall 2009), 38-49.
- D. Larson and K. Miller. When sensitive information crosses international borders. IT Professional, Vol. 11, No. 4 (July/August 2009), 56-59.
- G. Hurlburt, K. Miller, J. Voas and J. Day. Privacy and/or security: take your pick. IT Professional¸ Vol. 11, No. 4 (July/August 2009), 52-55.
- M. Wolf, K. Miller and F. Grodzinsky. Free, source-code-available or proprietary: an ethically charged, context sensitive choice. Computers and Society, Vol. 39, No. 1 (June, 2009), 15-26.
- D. Gotterbarn and K. Miller. The public is the priority: making decisions using the Software Engineering Code of Ethics, IEEE Computer, Vol. 42, No. 6 (May 2009), 66-73.
- G. Hurlburt, K. Miller and J. Voas. An ethical analysis of automation, risk, and the financial crises of 2008. IT Professional, Vol.11, No.1 (Jan.-Feb. 2009), 14-19.
- K. Miller and J. Voas. The metaphysics of software trust. IT Professional, Vol. 11, No. 2 (2009), 56-59.
- F. Grodzinsky, K. Miller, and M. Wolf. The ethics of designing artificial agents. Ethics and Information Technology, Vol. 10, Nos. 2-3 (2008), 115-121.
- D. Johnson and K. Miller. Unmaking artificial moral agents. Ethics and Information Technology, Vol. 10, Nos. 2-3 (2008), 123-133.
- K. Miller and J. Voas. Information integrity and I.T. professionals’ integrity, intertwined. Originally appeared in IEEE Transactions on Reliability, Vol. 57, No. 3 (Sept. 2008) 411-413, as part of the IEEE Reliability Society’s Annual Technical Report. Reprinted, with revisions, in IT Professional, Vol. 10, No. 6 (Nov/Dec 2008), 31-35.
- K. Miller and J. Voas. Computer scientist, software engineer or IT professional: which do you think you are? IT Professional, Vol. 10, No. 4 (July/August, 2008), 4-6.
- K. Miller. Critiquing a Critique: A Comment on “A Critique of Positive Responsibility in Computing.” Science and Engineering Ethics. Vol.4, No.2 (June, 2008), 245-249.
- K. Miller. Open source software and consequential responsibility: GPU, GPL, and the no military use clause. APA Newsletter of Philosophy and Computers, Vol. 6, No. 2, P. Boltuc, ed. (Spring, 2007), 17-22.
- J. Voas and K. Miller. Software certification services: Encouraging trust and reasonable expectations. IT Professional, Vol. 8, No. 5 (Sept/Oct 2006), 39-46.
- F. Grodzinsky, K. Miller and M. Wolf. Influences on and incentives for increasing software reliability, Journal of Information, Communication and Ethics in Society, Vol. 4, No. 2 (2006), 103-113.
- K. Miller and J. Voas. Software test cases: is one ever enough? IT Professional, Vol. 8, No. 1 (Jan/Feb 2006), 44-48.
- K. Miller and D. Larson. Agile software development: human values and culture. IEEE Technology and Society, Vol. 24, No.4 (Winter 2005), 36-43.
- K. Miller. Web standards: Why so many stray from the narrow path. Science and Engineering Ethics, Vol. 11, No. 3 (July, 2005), 477-479.
- K. Miller and D. Larson. Angels and artifacts: Moral agents in the age of computers and networks. Journal of Information, Communication & Ethics in Society, Vol. 3, No. 3 (July, 2005), 151-157.
- D. Larson and K. Miller. Silver bullets for little monsters: incremental progress in making software more trustworthy. IT Professional, Vol. 7, No. 2 (March/April 2005), 9-13.
- D. Gotterbarn and K. Miller. Computer ethics in the undergraduate curriculum: case studies and the joint software engineer’s code. Journal of Computing Sciences in Colleges, Vol. 20, No. 2 (December 2004), 156-167.
- K. Miller. Test driven development on the cheap: text files and explicit scaffolding. Journal of Computing Sciences in Colleges, Vol. 20, No. 2 (December 2004), 181-189.
- C. Huff, R. Anderson, J. Currie Little, D. Johnson, R. Kling, C. D. Martin, K. Miller. Integrating the Ethical and Social Context of Computing into the CS Curriculum: An Interim Report from the Content Subcommittee of the ImpactCS Steering Committee. The Ethicomp Journal (online) Vol. 1, No. 2 (June 2004), http://www.ccsr.cse.dmu.ac.uk/journal/ (accessed June 8, 2004), (reprint of conference paper).
- K. Miller. The future looks dim: building the information society with shoddy materials. The Ethicomp Journal (online) Vol. 1, No. 1 (January 2004), http://www.ccsr.cse.dmu.ac.uk/journal/ (accessed Feb. 4, 2004), (reprint of conference paper).
- F. Grodzinsky, K. Miller and M. Wolfe. Ethical Issues in open source software. Journal of Information, Communication and Ethics in Society, Vol. 1, Issue 4 (Oct. 2003), 193-205. (reprint of conference paper)
- C. Huff, D. Johnson and K. Miller. Virtual harms and real responsibility. IEEE Technology and Society Magazine Vol. 22, No. 2 (Summer, 2003), 12-19. (revision of conference paper)
- D. Jenkins, S. Grissom and K. Miller. Consequences of prairie wetland drainage for crustacean biodiversity and metapopulations. Conservation Biology Vol. 17, No. 1 (February 2003), 158-167.
- D. Johnson and K. Miller. Is diversity in computing a moral matter? Inroads, Vol. 33, No. 2 (June, 2002), 9-10.
- K. Miller. A modest proposal for software testing. IEEE Software, Vol. 18, No. 2 (March/April 2001), 96-98.
- D. Johnson and K. Miller. The ties that bind: connections, Comet Cursors, and consent. Computers and Society, Vol. 31, No. 1 (March 2001), 12-16.
- D. Gotterbarn, K. Miller and S. Rogerson. Code reuse: a response. Software Engineering Notes, Vol. 24, No. 3 (May 1999), 4-6.
- D. Gotterbarn, K. Miller, and S. Rogerson. Software engineering code of ethics is approved. Communications of the ACM, Vol. 42, No. 10 (October 1999), 102-107 and IEEE Computer, Vol. 32, No. 10 (October 1999), 84-88.
- K. Miller and J. Voas. An ethical can of worms for software certifiers. IT Professional, Vol. 1, No. 5, (Sept./Oct. 1999), 18-20.
- S. Grissom and K. Miller. N version testing in the undergraduate curriculum. Computer Science Education, Vol. 9, No. 1 (April, 1999), 1-7.
- K. Miller. Software informed consent: docete emptorem, not caveat emptor. Science and Engineering Ethics, Vol. 4, No. 3 (July 1998), 357-362.
- D. Johnson and K. Miller. Anonymity, pseudonymity, or inescapable identity on the Net. Computers and Society (June 1998), 37-38.
- T. Jewett and K. Miller, eds. Proceedings of the Conference on Ethics and Social Impact Component (POLICY-98) in Computers and Society, Vol. 28, No. 2 (May 10, 1998).
- D. Gotterbarn, K. Miller, and S. Rogerson. Software engineering code of ethics: IEEE-CS/ACM Joint Task Force on Software Engineering and Professional Practices. Appearing both in IEEE Computer (October 1997), 88-92; and in Communications of the ACM (November 1997), 110-118.
- J. Voas, F. Charron, G. McGraw, K. Miller, and M. Friedman. Predicting how badly ‘good’ software can behave. IEEE Software, Vol. 14, No. 4 (July/August, 1997), 73-83.
- D. Gotterbarn, K. Miller, and S. Rogerson. Software engineering ethics code. Computers and Society (June, 1997), 42-45.
- C. D. Martin, C. Huff, D. Gotterbarn, and K. Miller. Implementing a tenth strand in the CS curriculum. Communications of the ACM, Vol. 39, No. 12 (December, 1996), 75-84.
- C. D. Martin, C. Huff, D. Gotterbarn, and K. Miller. A framework for implementing and teaching the social and ethical impact of computing. Education and Information Technologies. Vol. 1, No. 1 (1996).
- J. Voas and K. Miller. Software testability: the new verification. IEEE Software, Vol. 12, No. 3 (May, 1995), 17-28.
- J. Voas, C. Michael, and K. Miller. Confidently assessing a zero probability of software failure. High Integrity Systems Journal, Vol. 1, No. 3 (1995), 269-275.
- J. Voas and K. Miller. Dynamic testability analysis for assessing fault tolerance. High Integrity Systems Journal, Vol. 1, No. 2 (1994), 171-178.
- W. R. Collins, K. Miller, B. Spielman, and P. Wherry. How good is good enough? An ethical analysis of software construction and use. Communications of the ACM, Vol. 37, No. 1 (January 1994), 81-91.
- S. Park, K. Miller, and P. Stockmeyer. Response to a series of technical correspondence. Communications of the ACM. Vol. 36, No. 7 (July 1993), 108-110.
- J. Voas and K. Miller. Semantic metrics for software testability. Journal of Systems and Software. Vol. 20, No. 3 (March 1993), 207-216.
- J. Voas and K. Miller. Applying a dynamic testability technique to debugging certain classes of software faults. Software Quality Journal (March 1993), 61-75.
- J. Voas and K. Miller. The revealing power of a test case. Journal of Software Testing, Verification, and Reliability. Vol. 2, No. 1 (January 1993), 25-42.
- J. Voas, K. Miller, and J. Payne. Designing programs that are less likely to hide faults. Journal of Systems and Software. Vol. 20 (January, 1993), 93-100.
- K. Miller, L. Morell, R. Noonan, S. Park, D. Nicol, B. Murrill, and J. Voas. Estimating the probability of failure when testing reveals no errors. IEEE Trans. on Software Engineering, Vol. 18, No. 1 (January, 1992), 33-43.
- R. Kincaid, K. Miller, and S. Park. Simulation analysis of mobile servers on a congested network. American Journal of Mathematical and Management Sciences. Vol. 12, No. 1 (1992), 43-64.
- W. R. Collins and K. Miller. Paramedic ethics for computing professionals. Journal of Systems and Software (January, 1992), 23-38.
- J. Burton, K. Miller, and S. Park. Hexagonally sampled digital image system fidelity analysis. Journal of Imaging Technology, Vol. 17, No. 6 (December 1991), 279-283.
- J. Voas, L. Morell, and K. Miller. Predicting where faults can hide from testing. IEEE Software, Vol. 8, No. 2 (March 1991), 34-48.
- W. R. Collins and K. Miller. Defining and implementing FORTRAN generic abstract data types. Information and Software Technology, Vol. 33, No. 4 (March, 1991), 281-291.
- W. R. Collins and K. Miller. Programming and the public trust. National Forum, Vol. 29 (Summer, 1991), 28-29.
- S. Reichenbach, J. Burton, and K. Miller. A comparison of algorithms for computing the discrete Hartley transform. Journal of the Optical Society of America A, Vol. 6, No. 6 (June 1989), 818-822.
- K. Miller, L. Morell, and F. Stevens. Enforcing data abstraction to enhance the reuse of FORTRAN software. IEEE Software, Vol. 5, No. 6 (November, 1988), 50-58.
- S. Park and K. Miller. Random number generators: good ones are hard to find. Communications of the ACM, Vol. 31, No. 10 (October, 1988), 1192-1201.
- A. Zuckerwar and K. Miller. Vibrational-vibrational coupling in air at low humidities. Journal of the Acoustical Society of America, Vol.84, No. 3 (September, 1988), 970-977.
- K. Miller. Integrating ethics into the computer science curriculum. Computer Science Education, Vol.1, No.1 (August, 1988), 37-52.
- R. Ford and K. Miller. Abstract data type development and implementation: an example. IEEE Trans. on Software Engineering, Vol.SE-11, No.10 (Oct. 1985) 1033-1037.