• miller1
  • miller2
  • miller3
  • miller4
  • miller5

Book Contributions and Web Collections

  1. F. Grodzinsky, K. Miller, and M. Wolf. Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, in On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence. Springer (2019).
  2. M. Taddeo, K. Miller, and W. Wallach, Eds. The Ethics of Information Technologies. Wildy and Sons (2016).
  3. K. Miller. Applying “Moral Responsibility for Computing Artifacts” to PICT.  In Emerging Pervasive Information and Communication Technologies (PICT). Ethical Challenges, Opportunities and Safeguards, Kenneth Pimple, Editor. Springer-Verlag (2013).
  4. M. Wolf, F. Grodzinsky and K. Miller. Artificial Agents, Cloud Computing, and Quantum Computing: Applying Floridi’s Method of Levels of Abstraction. In Luciano Floridi’s Philosophy of Technology: Critical Reflections, Edited by Hilmi Demir, Springer-Verlag (2011).
  5. Software Test Automation, edited by P. Laplante, F. Belli, J. Gao, G. Ka pfhammer, K. Miller, W. E. Wong and D. Xu. Special Issue of Advances in Software Engineering. Hindawi Publishing Corp. (2010).
  6. K. Miller. Unit testing, in The Encyclopedia of Software Engineering, P. Laplant, ed. Taylor & Francis (2010).
  7. D. Johnson with K. Miller. Computer Ethics: Analyzing Information Technology, 4th Ed. Prentice-Hall (2009).
  8. M. Lemke, R. George and K. Miller. 2008. Mud and microbes:  A time-lapse photographic exploration of a sediment bacterial community. Movie contribution to the Microbe Library, American Society of Microbiology at http://www.microbelibrary.org/.
  9. K. Miller and J. Moor. The ethics of spam. Handbook of Information and Computer Ethics. K. Himma and H. Tavani, eds. John Wiley and Sons, Inc. (2008), 517-531.
  10. M. Loui and K. Miller. Professional ethics for computing professionals. Encyclopedia of Software Engineering, P. LaPlante, ed. Taylor and Francis Group (2007).
  11. F. Grodzinsky, K. Miller and M.  Wolf. The ethical implications of the messenger’s haircut: steganography in the digital age. In  Internet Security:  Hacking, Counterhacking, and Society, K. Himma ed., Jones and Bartlett (2006).
  12. K. Miller. Computer hardware and software, and the ethical implications of that distinction. In The Encyclopedia of Science, Technology, and Ethics, C. Mitchum, ed. Macmillan Reference (2005).
  13. K. Miller. Computer virus and infection. In The Encyclopedia of Science, Technology, and Ethics, C. Mitchum, ed. Macmillan Reference (2005).
  14. D. Johnson and K. Miller. Ethical issues for computer scientists. The Computer Science and Engineering Handbook 2nd Ed, A. Tucker, ed. Springer-Verlag (2004), 2.1-2.12.
  15. 13. F. Grodzinsky, K. Miller and M.  Wolf. Ethical Issues in Open Source Software. Readings  in Cyberethics 2nd edition, R. Spinello and H. Tavani, eds.  Jones and Bartlett, 2004. 351-366. (reprinted conference paper),
  16. 14. K. Miller, Making Decisions About Computers, Information and Society, in An Invitation to Computer Science, 3rd Ed., by G. Michael Schneider and Judith L. Gersting. Brooks/Cole, (2004), 659-684.
  17. 15. C. Huff, D. Johnson, and K. Miller. Virtual Harms and Real Responsibility, in Social, Ethical, and Policy Implications of Information Technology, L. Brennan and V. Johnson, eds. Information Science Publishing (2004), 98-116. (Revision of conference paper.)
  18. 16. D. Gotterbarn, K. Miller, and S. Rogerson. Software Engineering Code of Ethics is approved, in Readings in CyberEthics, R. Spinello and H. Tavani, eds. Jones & Bartlett (2001), 535-544. (Reprinted journal article)
  19. 17. K. Miller. Ethical Considerations. Handbook on Information Technologies for Education and Training, H. Adelsberger, B. Collis, J. Pawlowski, eds. Springer-Verlag (2001), 355-363.
  20. 18. D. Gotterbarn and K. Miller. Maturing standards and the current software engineering code of ethics, in Privacy and the Constitution, M. Placencia, ed. (part of the series Controversies in Constitutional Law, P. Finkelman, ed.), Garland Publishing (1999).
  21. 19. K. Miller. Web sites you don’t like. Virginia Tech / NSF Infrastructure Project, J.A.N. Lee, editor, http://ei.cs.vt.edu/~cs3604/lib/Freedom.of.Speech/Objectionable.html (April 1, 1999).
  22. 20. D. Johnson and K. Miller. Ethical issues for computer scientists and engineers. The Computer Science and Engineering Handbook, A. Tucker, ed. Springer-Verlag (1997).
  23. W. R. Collins and K. Miller. Programming and the public trust. In Computers, Ethics & Social Values. D. Johnson and H. Nissenbaum, eds. Prentice Hall, Englewood Cliffs, NJ (1995). (Reprinted journal article)
  24. W. R. Collins and K. Miller. Paramedic ethics for computer professionals. In Computers, Ethics & Social Values. D. Johnson and H. Nissenbaum, eds. Prentice Hall, Englewood Cliffs, NJ (1995). (Revised version of journal article)
  25. S. Park, S. Harvey, R. Kincaid, and K. Miller. Alternate server disciplines for mobile-servers on a congested network. In Computer Science and Operations Research: New Developments in Their Interfaces. O. Balci, R. Sharda, and S. Zenios, eds. Pergamon Press, Oxford (1992), 105-116. (Revised version of conference paper)
  26. 24. R. Kincaid, K. Miller, and S. Park. Locating P mobile servers on a congested network: a simulation analysis. In Impacts of Recent Computer Advances on Operations Research. R. Sharda, B. Golden, E. Wasil, O. Balci, and W. Stewart, eds. North Holland: New York (1989), 396-406. (Revised version of conference paper)