Photos of Keith Miller in a banner

Keith Miller Peer-Reviewed Publications


  1. M. Wolf, F. Grodzinsky, and K. Miller (2024). Generative AI and Its Implications for Definitions of Trust. Information,15(9), 542.
  2. J. Voas and K. Miller (2024). Algorithms as Defendants? IEEE Computer, 57, 7, 11-14.
  3. D. Gotterbarn and K. W. Miller (2024). Cui Bono? Software Professionals Should Always Ask “Who Benefits?” IEEE Computer,57, 2,  64-69.
  4. F. Grodzinsky, M. Wolf, and K. Miller (2024). Ethical Issues from Emerging AI Applications: Harms are Happening. IEEE Computer. 57, 2, vol. 57, 44-52.
  5. N. Kshetri, K. Miller, G. Banerjee, B. Upreti (2023) FinChain: Adaptation of Blockchain Technology in Finance and Business-An Ethical Analysis of Applications, Challenges, Issues and Solutions. International Journal of Emerging and Disruptive Innovation in Education: VISIONARIUM. 1 , 1, Article 4. https://digitalcommons.lindenwood.edu/ijedie/vol1/iss1/4/
  6. K. Miller (2023). Computer-Enhanced Communication Among Deaf, Hard of Hearing, and Hearing People, IEEE Computer, 56 , 7, pp. 101-105.
  7. K. Miller (2023). Facial Recognition Technology: Navigating the Ethical Challenges, IEEE Computer, 56, 1, 76-81.
  8. F. Grodzinsky, K. Miller, and M. Wolf (2022). Session replay scripts: A privacy analysis. The Information Society, 38 , 4, 257-268.
  9. N. Kshetri and K. Miller (2022). The Rise in Autonomous Technology, Autonomous Weapons Systems, and Robot Weaponry: Enhancing Security or Increasing Threats? An Ethical Analysis, International Research Journal of Engineering and Technology, 9, 10, 823-832.
  10. K. Miller, D. Johnson and P. Drake (2022). The ConnectionRoom: A New Analogy for Understanding the Ethical Dimensions of Social Media, IEEE Computer, 55,(1), 74-81.
  11. J. Voas and K. Miller (2021). Confronting your Digital Accuser. IEEE Computer, 54(04), 11-13.
  12. Borenstein, J., Grodzinsky, F. S., Howard, A., Miller, K. W., & Wolf, M. J. (2021). AI Ethics: A Long History and a Recent Burst of Attention. IEEE Computer, 54(01), 96-102.
  13. Mardi, F., Miller, K., & Balcerzak, P. (2021, March). Novice-expert pair coaching: Teaching Python in a pandemic. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (pp. 226-231).
  14. J. Herkert, J. Borenstein, & K. Miller (2020). The Boeing 737 MAX: lessons for engineering ethics. Science and engineering ethics, 26: 2957–2974.
  15. J. Borenstien, J. Herkert, and K. Miller (2020) Autonomous vehicles and the ethical tension between occupant and non-occupant safety. Journal of Sociotechnical Critique. Vol. 1 : No. 1 , Article 1. Available at: https://digitalcommons.odu.edu/sociotechnicalcritique/vol1/iss1/1
  16. F. Grodzinsky, K. Miller, and M. Wolf (2020, submitted) Session replay scripts: an ethical analysis. The Information Society.
  17. Wolf, M. J., Miller, K. W., & Grodzinsky, F. S. (2019). On the responsibility for uses of downstream software. In D. Wittkower (Ed.), 2019 Computer Ethics – Philosophical Enquiry (CEPE) Proceedings, (14 pp.).
  18. J. Borenstien, J. Herkert, and K. Miller. (2019). Self-driving cars and engineering ethics: The need for a system level analysis. Science and Engineering Ethics25 (2), 383-398.
  19. D. Gotterbarn, M.Wolf, C. Flick, K.Miller (2018). Thinking professionally: The continual evolution of interest in computing ethics. ACM Inroads9(2), 10-12.
  20. D. Larson and K. Miller (2018). Action ethics – testing and data analysis. ACM Inroads, 9(1), 34-37.
  21. D. Gotterbarn, A. Bruckman, C. Flick, K. Miller, M. Wolf  (2018). ACM Code of Ethics: A guide for positive action. Communications of the ACM61(1), 121-128.
  22. D. Gotterbarn and K. Miller  (2017). Yes, but… our response to:“Professional ethics in the information age.”  Journal of Information, Communication and Ethics in Society, 15.4: 357-361..
  23. J. Borenstein, J. Herkert, and K. Miller (2017) Self-Driving Cars and Engineering Ethics: The Need for a System Level Analysis. Science and Engineering Ethics. 1-16.
  24. S. Rogerson,  K. Miller, J. Sunrise Winter, and D. Larson. Information systems ethics–challenges and opportunities. Journal of Information, Communication and Ethics in Society (2017).
  25. Brinkman, B., Flick, C., Gotterbarn, D., Miller, K., Vazansky, K., & Wolf, M. J. (2017). Dynamic Technology Challenges Static Codes of Ethics. ORBIT Journal, 1(2).
  26. M. J. Wolf, K. Miller, and F. S. Grodzinsky.  (2017) Why we should have seen that coming: comments on Microsoft’s Tay “experiment,” and wider implications. SIGCAS Comput. Soc. 47, 3, 54-64.
  27. J. Borenstein, J. Herkert, and K. Miller. Self-driving cars and the ethical responsibilities of design engineers. (2017) IEEE Technology and Society, 67-75.
  28. B. Brinkman, C.Flick, D. Gotterbarn, K. Miller, K. Vazansky, and M. Wolf. Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. (2017) Communications of the ACM 60, 5, 105-111.
  29. D. Larson and K. Miller. Action ethics for a software development class. (2017) ACM Inroads8, 1: 38-42 .
  30. Miller, Keith W., Marty J. Wolf, and Frances Grodzinsky. (2017) This “Ethical Trap” Is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision-Making.  Science and engineering ethics 23, 2: 389-401.
  31. B. Brinkman, D. Gotterbarn, K. Miller, and M. Wolf. (2016) Making a positive impact: updating the ACM code of ethics. Communications of the ACM 59, 12, 7-13.
  32. B. Brinkman, D. Gotterbarn, K. Miller, and M. Wolf.  (2016), All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity. SIGCAS Comput. Soc. 46, 3: 5-8.
  33. B. Spielman, C. Gorka, K. Miller, C. Pointer, and B. Hinze, Gender and Race in the Timing of Requests for Ethics Consultations: A Single-Center Study (2016) The Journal of Clinical Ethics. 27, 2: 154-162.
  34. M. Wolf, F. Grodzinsky, and K. Miller. (2016), There’s something in your eye: ethical implications of augmented visual field devices. Journal of Information, Communication and Ethics in Society 14.3: 214-230.
  35. Wolf M.J., Grodzinsky F., Miller K.W. (2016) Robots, Ethics and Software – FOSS vs. Proprietary Licenses. In: Müller V. (eds) Computing and Philosophy. Synthese Library (Studies in Epistemology, Logic, Methodology, and Philosophy of Science), vol 375. Springer.
  36. M.Wolf, F.Grodzinsky, and K. Miller (2016). Augmented reality all around us: power and perception at a crossroads. SIGCAS Comput. Soc. 45, 3 : 126-131.
  37. B. Spielman, J. Craig, C. Gorka, and K. Miller (2015). Case complexity and quality attestation for clinical ethics consultants,  Journal of Clinical Ethics, 26, 3: 231-240.
  38. F. Grodzinsky, K. Miller, and M. Wolf. Developing automated deceptions and the impact on trust. Philosophy & Technology.  Vol. 28, No. 1 (2015), 91-105.
  39. M. Lemke and K. Miller. On robots as genetically modified invasive species. Journal of Information, Communication & Ethics in Society, Vol. 12, No. 2 (2014), 122 – 132.
  40. K. Miller and D. Larson. Measuring a distance: Humans, cyborgs, and robots. APA Newsletter on Philosophy and Computers (Fall 2013), 20-24.
  41. K. Michael and K. Miller. Big data: New opportunities and new challenges. IEEE Computer, Vol. 46, No. 6 (June 2013), 22-24.
  42. J. Borenstein and K. Miller. Robots and the Internet: Causes for concern. IEEE Technology & Society¸ Vol. 32, No. 1 (Spring 2013), 60-65.
  43. F. S. Grodzinsky, K. Miller, and M. J. Wolf. Moral responsibility for computing artifacts: “the rules” and issues of trust. SIGCAS Comput. Soc. (2012), Vol. 42, No. 2 , 15-25.
  44. K. W. Miller, J. Voas and G. F. Hurlburt, BYOD (2012), Security and Privacy Considerations, IT Professional, 14 (5), 53-55.
  45. G. Hurlburt, J. Voas, and K. Miller. The Internet of things: a reality check. IT Professional, Vol. 13, No. 3 (May/June 2012), 56-59.
  46. F. Grodzinsky, K. Miller and M. Wolf. Developing artificial agents worthy of trust: “Would you buy a used car from this artificial agent?” Ethics and Information Technology, Vol. 13, No. 1 (March 2011), 17-27.
  47. S. Rogerson and K. Miller. Responsibilities in product creation. IMIS Journal, Vol. 21, No. 1 (March 2011), 36-37.
  48. P. Laplante, G. Hurlburt, K. Miller, and J. Voas. Certainty through uncertainty? IEEE Computer, Vol.44, No.2 (Feb. 2011), 79-81.
  49. G. Hulburt, J. Voas, K. Miller, P. Laplante and B. Michael. A non-linear perspective on higher education. IEEE Computer, Vol.43, No.12 (Dec. 2010), 90-92.
  50. K. Miller, J. Voas, and P. Laplante. In trust we trust. IEEE Computer, Vol. 43, No. 10 (October 2010), 85-87.
  51. K. Miller, J. Voas, and T. Costello. Free and open source software. IT Professional, Vol. 12, No. 6, 14-16.
  52. M. Wolf, K. Miller and F. Grodzinsky. On the meaning of Free Software. Ethics and Information Technology, Vol. 11, No. 4 (December 2009), 279-286.
  53. D. Larson and K. Miller. Ethics in the IT classroom: Why and how? Journal of Information Ethics, Vol. 18, No. 2 (Fall 2009), 38-49.
  54. D. Larson and K. Miller. When sensitive information crosses international borders. IT Professional, Vol. 11, No. 4 (July/August 2009), 56-59.
  55. G. Hurlburt, K. Miller, J. Voas and J. Day. Privacy and/or security: take your pick. IT Professional¸ Vol. 11, No. 4 (July/August 2009), 52-55.
  56. M. Wolf, K. Miller and F. Grodzinsky. Free, source-code-available or proprietary: an ethically charged, context sensitive choice. Computers and Society, Vol. 39, No. 1 (June, 2009), 15-26.
  57. D. Gotterbarn and K. Miller. The public is the priority: making decisions using the Software Engineering Code of Ethics, IEEE Computer, Vol. 42, No. 6 (May 2009),  66-73.
  58. G. Hurlburt, K. Miller and J. Voas. An ethical analysis of automation, risk, and the financial crises of 2008. IT Professional, Vol.11, No.1 (Jan.-Feb. 2009), 14-19.
  59. K. Miller and J. Voas. The metaphysics of software trust. IT Professional, Vol. 11, No. 2 (2009), 56-59.
  60. F. Grodzinsky, K. Miller, and M. Wolf. The ethics of designing artificial agents. Ethics and Information Technology, Vol. 10, Nos. 2-3 (2008), 115-121.
  61. D. Johnson and K. Miller. Unmaking artificial moral agents. Ethics and Information Technology, Vol. 10, Nos. 2-3 (2008), 123-133.
  62. K. Miller and J. Voas. Information integrity and I.T. professionals’ integrity, intertwined. Originally appeared in IEEE Transactions on Reliability, Vol. 57,  No. 3 (Sept. 2008) 411-413, as part of the IEEE Reliability Society’s Annual Technical Report. Reprinted, with revisions, in IT Professional, Vol. 10, No. 6 (Nov/Dec 2008), 31-35.
  63. K. Miller and J. Voas. Computer scientist, software engineer or IT professional: which do you think you are? IT Professional, Vol. 10, No. 4 (July/August, 2008), 4-6.
  64. K. Miller. Critiquing a Critique: A Comment on “A Critique of Positive Responsibility in Computing.” Science and Engineering Ethics. Vol.4, No.2 (June, 2008), 245-249.
  65. K. Miller. Open source software and consequential responsibility: GPU, GPL, and the no military use clause. APA Newsletter of Philosophy and Computers, Vol. 6, No. 2, P. Boltuc, ed. (Spring, 2007), 17-22.
  66. J. Voas and K. Miller. Software certification services: Encouraging trust and reasonable expectations. IT Professional, Vol. 8, No. 5 (Sept/Oct 2006), 39-46.
  67. F. Grodzinsky, K. Miller  and M. Wolf. Influences on and incentives for increasing software reliability, Journal of Information, Communication and Ethics in Society, Vol. 4, No. 2 (2006), 103-113.
  68. K. Miller and J. Voas. Software test cases: is one ever enough? IT Professional, Vol. 8, No. 1 (Jan/Feb 2006), 44-48.
  69. K. Miller and D. Larson. Agile software development: human values and culture. IEEE Technology and Society, Vol. 24, No.4 (Winter 2005), 36-43.
  70. K. Miller. Web standards: Why so many stray from the narrow path. Science and Engineering Ethics, Vol. 11, No. 3 (July, 2005), 477-479.
  71. K. Miller and D. Larson. Angels and artifacts: Moral agents in the age of computers and networks. Journal of Information, Communication & Ethics in Society, Vol. 3, No. 3 (July, 2005), 151-157.
  72. D. Larson and K. Miller. Silver bullets for little monsters: incremental progress in making software more trustworthy. IT Professional, Vol. 7, No. 2 (March/April 2005), 9-13.
  73. D. Gotterbarn and K. Miller. Computer ethics in the undergraduate curriculum: case studies and the joint software engineer’s code. Journal of Computing Sciences in Colleges, Vol. 20, No. 2 (December 2004), 156-167.
  74. K. Miller. Test driven development on the cheap: text files and explicit scaffolding. Journal of Computing Sciences in Colleges, Vol. 20, No. 2 (December 2004), 181-189.
  75. C. Huff, R. Anderson, J. Currie Little, D. Johnson, R. Kling, C. D. Martin, K. Miller. Integrating the Ethical and Social Context of Computing into the CS Curriculum: An Interim Report from the Content Subcommittee of the ImpactCS Steering Committee. The Ethicomp Journal (online) Vol. 1,  No. 2 (June 2004),  http://www.ccsr.cse.dmu.ac.uk/journal/ (accessed June 8, 2004),  (reprint of conference paper).
  76. K. Miller. The future looks dim: building the information society with shoddy materials. The Ethicomp Journal (online) Vol. 1,  No. 1 (January 2004),  http://www.ccsr.cse.dmu.ac.uk/journal/ (accessed Feb. 4, 2004),  (reprint of conference paper).
  77. F. Grodzinsky, K. Miller and M.  Wolfe.  Ethical Issues in open source software. Journal of Information, Communication and Ethics in Society, Vol. 1, Issue 4 (Oct. 2003), 193-205. (reprint of conference paper)
  78. C. Huff, D. Johnson and K. Miller. Virtual harms and real responsibility. IEEE Technology and Society Magazine Vol. 22, No. 2 (Summer, 2003), 12-19. (revision of conference paper)
  79. D. Jenkins, S. Grissom and K. Miller. Consequences of prairie wetland drainage for crustacean biodiversity and metapopulations. Conservation Biology Vol. 17, No. 1 (February 2003), 158-167.
  80. D. Johnson and K. Miller. Is diversity in computing a moral matter? Inroads, Vol. 33, No. 2 (June, 2002), 9-10.
  81. K. Miller. A modest proposal for software testing. IEEE Software, Vol. 18, No. 2 (March/April 2001), 96-98.
  82. D. Johnson and K. Miller. The ties that bind: connections, Comet Cursors, and consent. Computers and Society, Vol. 31, No. 1 (March 2001), 12-16.
  83. D. Gotterbarn, K. Miller and S. Rogerson. Code reuse: a response. Software Engineering Notes, Vol. 24, No. 3 (May 1999), 4-6.
  84. D. Gotterbarn, K. Miller, and S. Rogerson. Software engineering code of ethics is approved. Communications of the ACM, Vol. 42, No. 10 (October 1999), 102-107 and IEEE Computer, Vol. 32, No. 10 (October 1999), 84-88.
  85. K. Miller and J. Voas. An ethical can of worms for software certifiers. IT Professional, Vol. 1, No. 5, (Sept./Oct. 1999), 18-20.
  86. S. Grissom and K. Miller. N version testing in the undergraduate curriculum. Computer Science Education, Vol. 9, No. 1 (April, 1999), 1-7.
  87. K. Miller. Software informed consent: docete emptorem, not caveat emptorScience and Engineering Ethics, Vol. 4, No. 3 (July 1998), 357-362.
  88. D. Johnson and K. Miller. Anonymity, pseudonymity, or inescapable identity on the Net. Computers and Society (June 1998), 37-38.
  89. T. Jewett and K. Miller, eds. Proceedings of the Conference on Ethics and Social Impact Component (POLICY-98) in Computers and Society, Vol. 28, No. 2 (May 10, 1998).
  90. D. Gotterbarn, K. Miller, and S. Rogerson. Software engineering code of ethics: IEEE-CS/ACM Joint Task Force on Software Engineering and Professional Practices. Appearing both in IEEE Computer (October 1997), 88-92; and in Communications of the ACM (November 1997), 110-118.
  91. J. Voas, F. Charron, G. McGraw, K. Miller, and M. Friedman. Predicting how badly ‘good’ software can behave. IEEE Software, Vol. 14, No. 4 (July/August, 1997), 73-83.
  92. D. Gotterbarn, K. Miller, and S. Rogerson. Software engineering ethics code. Computers and Society (June, 1997), 42-45.
  93. C. D. Martin, C. Huff, D. Gotterbarn, and K. Miller. Implementing a tenth strand in the CS curriculum. Communications of the ACM, Vol. 39, No. 12 (December, 1996), 75-84.
  94. C. D. Martin, C. Huff, D. Gotterbarn, and K. Miller. A framework for implementing and teaching the social and ethical impact of computing. Education and Information Technologies. Vol. 1, No. 1 (1996).
  95. J. Voas and K. Miller. Software testability: the new verification. IEEE Software, Vol. 12, No. 3 (May, 1995), 17-28.
  96. J. Voas, C. Michael, and K. Miller. Confidently assessing a zero probability of software failure. High Integrity Systems Journal, Vol. 1, No. 3 (1995), 269-275.
  97. J. Voas and K. Miller. Dynamic testability analysis for assessing fault tolerance. High Integrity Systems Journal, Vol. 1, No. 2 (1994), 171-178.
  98. W. R. Collins, K. Miller, B. Spielman, and P. Wherry. How good is good enough? An ethical analysis of software construction and use. Communications of the ACM, Vol. 37, No. 1 (January 1994), 81-91.
  99. S. Park, K. Miller, and P. Stockmeyer. Response to a series of technical correspondence. Communications of the ACM. Vol. 36, No. 7 (July 1993), 108-110.
  100. J. Voas and K. Miller. Semantic metrics for software testability. Journal of Systems and Software. Vol. 20, No. 3 (March 1993), 207-216.
  101. J. Voas and K. Miller. Applying a dynamic testability technique to debugging certain classes of software faults. Software Quality Journal (March 1993), 61-75.
  102. J. Voas and K. Miller. The revealing power of a test case. Journal of Software Testing, Verification, and Reliability. Vol. 2, No. 1 (January 1993), 25-42.
  103. J. Voas, K. Miller, and J. Payne. Designing programs that are less likely to hide faults. Journal of Systems and Software. Vol. 20 (January, 1993), 93-100.
  104. K. Miller, L. Morell, R. Noonan, S. Park, D. Nicol, B. Murrill, and J. Voas. Estimating the probability of failure when testing reveals no errors. IEEE Trans. on Software Engineering, Vol. 18, No. 1 (January, 1992), 33-43.
  105. R. Kincaid, K. Miller, and S. Park. Simulation analysis of mobile servers on a congested network. American Journal of Mathematical and Management Sciences. Vol. 12, No. 1 (1992), 43-64.
  106. W. R. Collins and K. Miller. Paramedic ethics for computing professionals. Journal of Systems and Software (January, 1992), 23-38.
  107. J. Burton, K. Miller, and S. Park. Hexagonally sampled digital image system fidelity analysis. Journal of Imaging Technology, Vol. 17, No. 6 (December 1991), 279-283.
  108. J. Voas, L. Morell, and K. Miller. Predicting where faults can hide from testing. IEEE Software, Vol. 8, No. 2 (March 1991), 34-48.
  109. W. R. Collins and K. Miller. Defining and implementing FORTRAN generic abstract data types. Information and Software Technology, Vol. 33, No. 4 (March, 1991), 281-291.
  110. W. R. Collins and K. Miller. Programming and the public trust. National Forum, Vol. 29 (Summer, 1991), 28-29.
  111. S. Reichenbach, J. Burton, and K. Miller. A comparison of algorithms for computing the discrete Hartley transform. Journal of the Optical Society of America A, Vol. 6, No. 6 (June 1989), 818-822.
  112. K. Miller, L. Morell, and F. Stevens. Enforcing data abstraction to enhance the reuse of FORTRAN software. IEEE Software, Vol. 5, No. 6 (November, 1988), 50-58.
  113. S. Park and K. Miller. Random number generators: good ones are hard to find. Communications of the ACM, Vol. 31, No. 10 (October, 1988), 1192-1201.
  114. A. Zuckerwar and K. Miller. Vibrational-vibrational coupling in air at low humidities. Journal of the Acoustical Society of America, Vol.84, No. 3 (September, 1988), 970-977.
  115. K. Miller. Integrating ethics into the computer science curriculum. Computer Science Education, Vol.1, No.1 (August, 1988), 37-52.
  116. R. Ford and K. Miller. Abstract data type development and implementation: an example. IEEE Trans. on Software Engineering, Vol.SE-11, No.10 (Oct. 1985) 1033-1037.