Number of co-authors:16
Number of publications with 3 favourite co-authors:Scott Dick:3Ian Reay:2Patricia Beatty:2
James Miller's 3 most productive colleagues in number of publications:Paul Resnick:30Valerie J. Gawron:15Philip Kortum:15
Computer analyst to programmer: "You start coding. I'll go find out what they want."
-- Popular computer one-liner
Read the fascinating history of Wearable Computing, told by its father, Steve Mann
Read Steve's chapter !
Publications by James Miller (bibliography)
Khaled, Adel and Miller, James (2010): Chronological fault-based mutation processes for WS-BPEL 2.0 programs. In Int. J. Web Eng. Technol., 6 (2) pp. 141-170.
Bangor, Aaron, Kortum, Philip and Miller, James (2009): Determining What Individual SUS Scores Mean: Adding an Adjective Rating Scale. In Journal of Usability Studies, 4 (3) pp. 114-123.
The System Usability Scale (SUS) is an inexpensive, yet effective tool for assessing the usability of a product, including Web sites, cell phones, interactive voice response systems, TV applications, and more. It provides an easy-to-understand score from 0 (negative) to 100 (positive). While a 100-point scale is intuitive in many respects and allows for relative judgments, information describing how the numeric score translates into an absolute judgment of usability is not known. To help answer that question, a seven-point adjective-anchored Likert scale was added as an eleventh question to nearly 1,000 SUS surveys. Results show that the Likert scale scores correlate extremely well with the SUS scores (r=0.822). The addition of the adjective rating scale to the SUS may help practitioners interpret individual SUS scores and aid in explaining the results to non-human factors professionals.
© All rights reserved Bangor et al. and/or Usability Professionals Association
Reay, Ian, Dick, Scott and Miller, James (2009): A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. In ACM Transactions on the Web, 3 (2) p. 6.
Numerous studies over the past ten years have shown that concern for personal privacy is a major impediment to the growth of e-commerce. These concerns are so serious that most if not all consumer watchdog groups have called for some form of privacy protection for Internet users. In response, many nations around the world, including all European Union nations, Canada, Japan, and Australia, have enacted national legislation establishing mandatory safeguards for personal privacy. However, recent evidence indicates that Web sites might not be adhering to the requirements of this legislation. The goal of this study is to examine the posted privacy policies of Web sites, and compare these statements to the legal mandates under which the Web sites operate. We harvested all available P3P (Platform for Privacy Preferences Protocol) documents from the 100,000 most popular Web sites (over 3,000 full policies, and another 3,000 compact policies). This allows us to undertake an automated analysis of adherence to legal mandates on Web sites that most impact the average Internet user. Our findings show that Web sites generally do not even claim to follow all the privacy-protection mandates in their legal jurisdiction (we do not examine actual practice, only posted policies). Furthermore, this general statement appears to be true for every jurisdiction with privacy laws and any significant number of P3P policies, including European Union nations, Canada, Australia, and Web sites in the USA Safe Harbor program.
© All rights reserved Reay et al. and/or ACM
Tappenden, Andrew F. and Miller, James (2009): Cookies: A deployment study and the testing implications. In ACM Transactions on the Web, 3 (3) p. 9.
The results of an extensive investigation of cookie deployment amongst 100,000 Internet sites are presented. Cookie deployment is found to be approaching universal levels and hence there exists an associated need for relevant Web and software engineering processes, specifically testing strategies which actively consider cookies. The semi-automated investigation demonstrates that over two-thirds of the sites studied deploy cookies. The investigation specifically examines the use of first-party, third-party, sessional, and persistent cookies within Web-based applications, identifying the presence of a P3P policy and dynamic Web technologies as major predictors of cookie usage. The results are juxtaposed with the lack of testing strategies present in the literature. A number of real-world examples, including two case studies are presented, further accentuating the need for comprehensive testing strategies for Web-based applications. The use of antirandom test case generation is explored with respect to the testing issues discussed. Finally, a number of seeding vectors are presented, providing a basis for testing cookies within Web-based applications.
© All rights reserved Tappenden and Miller and/or ACM
Beatty, Patricia, Dick, Scott and Miller, James (2008): Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards. In IEEE Internet Computing, 12 (2) pp. 76-80.
Beatty, Patricia, Reay, Ian, Dick, Scott and Miller, James (2007): P3P Adoption on E-Commerce Web sites: A Survey and Analysis. In IEEE Internet Computing, 11 (2) pp. 65-71.
El-Attar, Mohamed and Miller, James (2006): Matching Antipatterns to Improve the Quality of Use Case Models. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 96-105.
Huynh, Toan and Miller, James (2005): Further investigations into evaluating Web site reliability. In: ISESE 2005 - International Symposium on Empirical Software Engineering 17-18 November, 2005, Noosa Heads, Australia. pp. 162-171.
Miller, James and Yin, Zhichao (2003): Adding Diversity to Software Inspections. In: Patel, Dilip, Patel, Shushma and Wang, Yingxu (eds.) Proceedings of the 2nd IEEE International Conference on Cognitive Informatics ICCI 2003 18-20 August, 2003, London, UK. pp. 81-88.
Miller, James, Ferguson, John D. and Murphy, Paul (1999): Groupware Support for Asynchronous Document Review. In: ACM 17th International Conference on Systems Documentation 1999. pp. 185-192.
The formal document review process has basically remained unchanged since it was first introduced by Fagan in 1976. Central to this process is the review meeting, which all participants attend. However, recent empirical work has indicated that this meeting is not necessarily effective. A review model and a prototype co-operative work tool, InspectA, that dispense totally with the need for reviewers to hold face-to-face meetings, are presented. They replace the meeting with further individual reviews combined with communication between reviewers facilitated by electronic mail. The model and tool are both compared with other existing work in the area of meetingless review.
© All rights reserved Miller et al. and/or ACM Press
Resnick, Paul and Miller, James (1996): PICS: Internet Access Controls Without Censorship. In Communications of the ACM, 39 (10) pp. 87-93.
Gawron, Valerie J., Schiflett, Samuel, Miller, James and Ball, John (1988): Incident Analysis of the Effects of Pyridostigmine Bromide. In: Proceedings of the Human Factors Society 32nd Annual Meeting 1988. pp. 20-24.
The effects of a chemical defense protective drug, pyridostigmine bromide (PB), on inflight aircrew performance were assessed using the Total In-Flight Simulation (TIFS) aircraft. This aircraft was used as both a ground and inflight simulator supplying appropriate control feel, handling characteristics, and cockpit instrumentation for a tactical-transport simulation. Twenty-one C-130 pilots flew two familiarization and four data flights. As part of this study, video recordings of aircrew behavior from preflight through landing were analyzed using an incident analysis technique. Behaviors were grouped in 23 categories including irritability, humor, and accidental activation. The frequencies of occurrences of each of these behaviors by drug (PB or placebo) and crew position (pilot or copilot) are presented as well as an assessment of the utility of the incident analysis technique in drug research.
© All rights reserved Gawron et al. and/or Human Factors Society
Show this list on your homepage
Join the technology elite and advance:
Changes to this page (author)23 Nov 2012: Added23 Nov 2012: Added
31 Oct 2011: Added
18 Nov 2010: Added
21 Feb 2010: Modified
18 Aug 2009: Added
03 Jun 2009: Added
02 Jun 2009: Added
02 Jun 2009: Added
30 May 2009: Added
30 May 2009: Added
25 Jun 2007: Added
22 Jun 2007: Added
Page maintainer: The Editorial Team