Photos of Keith Miller in a banner

Keith Miller Book Contributions and Web Collections


  1. J. Herkert, J. Borenstein, & K. Miller (2022). Planes, Trains, & Flying Taxis: Ethics and the Lure of Autonomous Vehicles, in Test-Driving the Future, D. Michelfelder (ed.). Rowman & Littlefield, 131-149.
  2. F. Mardi, P. Balcerzak, & K. Miller (2021). A Community Partnership in the Age of a Pandemic: What Mattered to Black Adolescent Girls, in Healing Power of Leadership: Lessons from the Coronavirus Lockdown, T. Makubuya (ed.). Kendall Hunt Publishing Co.
  3. F. Grodzinsky, K. Miller, & M. Wolf (2020). Trust in Artificial Agents, in The Routledge Handbook of Trust and Philosophy, edited by Judith Simon, Routledge: New York and London, 298-312.
  4. M. Wolf, F. Grodzinsky, & K. Miller (2020). On using a model for downstream responsibility, in Ethicomp 2020: Challenges in the Smart Society, edited by Mario Arias-Oliva, Jorge Pelegrín-Borondo, Kiyoshi Murata, & Ana María Lara Palma, 549-560.
  5. M. Wolf, F. Grodzinsky, & K. Miller. Robots, Ethics and Software – FOSS vs. Proprietary Licenses (2020), in Computers and Philosophy: Selected Papers from IACAP 2014. Edited by V. Mueller. Springer, 271-282.
  6. F. Grodzinsky, K. Miller, & M. Wolf (2019). Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, in On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer.
  7. M. Taddeo, K. Miller, & W. Wallach, Eds. (2016). The Ethics of Information Technologies. Wiley and Sons.
  8. K. Miller (2013). Applying “Moral Responsibility for Computing Artifacts” to PICT.  In Emerging Pervasive Information and Communication Technologies (PICT). Ethical Challenges, Opportunities and Safeguards, Kenneth Pimple, Editor. Springer-Verlag.
  9. M. Wolf, F. Grodzinsky and K. Miller. Artificial Agents, Cloud Computing, and Quantum Computing: Applying Floridi’s Method of Levels of Abstraction. In Luciano Floridi’s Philosophy of Technology: Critical Reflections, Edited by Hilmi Demir, Springer-Verlag (2011).
  10. Software Test Automation, edited by P. Laplante, F. Belli, J. Gao, G. Ka pfhammer, K. Miller, W. E. Wong and D. Xu. Special Issue of Advances in Software Engineering. Hindawi Publishing Corp. (2010).
  11. K. Miller. Unit testing, in The Encyclopedia of Software Engineering, P. Laplant, ed. Taylor & Francis (2010).
  12. D. Johnson with K. Miller. Computer Ethics: Analyzing Information Technology, 4th Ed. Prentice-Hall (2009).
  13. M. Lemke, R. George and K. Miller. 2008. Mud and microbes:  A time-lapse photographic exploration of a sediment bacterial community. Movie contribution to the Microbe Library, American Society of Microbiology at http://www.microbelibrary.org/.
  14. K. Miller & J. Moor. The ethics of spam. Handbook of Information and Computer Ethics. K. Himma and H. Tavani, eds. John Wiley and Sons, Inc. (2008), 517-531.
  15. M. Loui & K. Miller. Professional ethics for computing professionals. Encyclopedia of Software Engineering, P. LaPlante, ed. Taylor and Francis Group (2007).
  16. F. Grodzinsky, K. Miller and M.  Wolf. The ethical implications of the messenger’s haircut: steganography in the digital age. In  Internet Security:  Hacking, Counterhacking, and Society, K. Himma ed., Jones and Bartlett (2006).
  17. K. Miller. Computer hardware and software, and the ethical implications of that distinction. In The Encyclopedia of Science, Technology, and Ethics, C. Mitchum, ed. Macmillan Reference (2005).
  18. K. Miller. Computer virus and infection. In The Encyclopedia of Science, Technology, and Ethics, C. Mitchum, ed. Macmillan Reference (2005).
  19. D. Johnson & K. Miller. Ethical issues for computer scientists. The Computer Science and Engineering Handbook 2nd Ed, A. Tucker, ed. Springer-Verlag (2004), 2.1-2.12.
  20. 13. F. Grodzinsky, K. Miller and M.  Wolf. Ethical Issues in Open Source Software. Readings  in Cyberethics 2nd edition, R. Spinello and H. Tavani, eds.  Jones and Bartlett, 2004. 351-366. (reprinted conference paper),
  21. 14. K. Miller, Making Decisions About Computers, Information and Society, in An Invitation to Computer Science, 3rd Ed., by G. Michael Schneider and Judith L. Gersting. Brooks/Cole, (2004), 659-684.
  22. 15. C. Huff, D. Johnson, & K. Miller. Virtual Harms and Real Responsibility, in Social, Ethical, and Policy Implications of Information Technology, L. Brennan and V. Johnson, eds. Information Science Publishing (2004), 98-116. (Revision of conference paper.)
  23. 16. D. Gotterbarn, K. Miller, & S. Rogerson. Software Engineering Code of Ethics is approved, in Readings in CyberEthics, R. Spinello and H. Tavani, eds. Jones & Bartlett (2001), 535-544. (Reprinted journal article)
  24. 17. K. Miller. Ethical Considerations. Handbook on Information Technologies for Education and Training, H. Adelsberger, B. Collis, J. Pawlowski, eds. Springer-Verlag (2001), 355-363.
  25. 18. D. Gotterbarn & K. Miller. Maturing standards and the current software engineering code of ethics, in Privacy and the Constitution, M. Placencia, ed. (part of the series Controversies in Constitutional Law, P. Finkelman, ed.), Garland Publishing (1999).
  26. 19. K. Miller. Web sites you don’t like. Virginia Tech / NSF Infrastructure Project, J.A.N. Lee, editor, http://ei.cs.vt.edu/~cs3604/lib/Freedom.of.Speech/Objectionable.html (April 1, 1999).
  27. 20. D. Johnson & K. Miller. Ethical issues for computer scientists and engineers. The Computer Science and Engineering Handbook, A. Tucker, ed. Springer-Verlag (1997).
  28. W. R. Collins & K. Miller. Programming and the public trust. In Computers, Ethics & Social Values. D. Johnson and H. Nissenbaum, eds. Prentice Hall, Englewood Cliffs, NJ (1995). (Reprinted journal article)
  29. W. R. Collins & K. Miller. Paramedic ethics for computer professionals. In Computers, Ethics & Social Values. D. Johnson and H. Nissenbaum, eds. Prentice Hall, Englewood Cliffs, NJ (1995). (Revised version of journal article)
  30. S. Park, S. Harvey, R. Kincaid, & K. Miller. Alternate server disciplines for mobile-servers on a congested network. In Computer Science and Operations Research: New Developments in Their Interfaces. O. Balci, R. Sharda, & S. Zenios, eds. Pergamon Press, Oxford (1992), 105-116. (Revised version of conference paper)
  31. 24. R. Kincaid, K. Miller, & S. Park. Locating P mobile servers on a congested network: a simulation analysis. In Impacts of Recent Computer Advances on Operations Research. R. Sharda, B. Golden, E. Wasil, O. Balci, & W. Stewart, eds. North Holland: New York (1989), 396-406. (Revised version of conference paper)