Colloquium Archive

How To Write Your First Android App

Robert Bruce

03/15/2012

Writing applications (apps) for the Android-based smart-phone market need not be difficult. In this presentation, you'll learn about the Android development process and dissect a real-world text-messaging app the author published in the Android marketplace using Java and XML (extensible Markup Language) .

Improving The World? There's An App For That

Ellen Spertus, Mills College, Oakland, CA

03/22/2012

With the rising availability of increasingly powerful mobile phones worldwide, apps are growing in popularity and importance . Google's App Inventor for Android was created to harness that enthusiasm and to meet human needs and desires by enabling non-programmers to easily create apps in a visual development environment. Ellen Spertus, one of the members of the App Inventor team and a faculty member at Mills College, will demonstrate App Inventor, present stories of how it has been used to inspire and empower students and hobbyists, and detail other ways that mobile apps are changing the world.

Prototyping Games

Jason Shankel, The Stupid Fun Club

04/05/2012

As budgets, schedules and quality standards in software projects grows, so do the cost of mistakes and course changes. The speaker will describe the essential role of prototyping in software game development.

Managing Payment Risk In The Era Of Digital Business

Michael J. Freiling, PhD, CFA, Conceptrics, Lake Oswego, OR

04/12/2012

Digital business is rapidly evolving from simple e-commerce sites into complex networks that impact all aspects of the business value chain. Electronic payment systems are key components of this infrastructure, and managing the risks associated with electronic payments is a critical element in preserving the trust and integrity necessary to continued successful operation. In this talk, we will survey the infrastructure for electronic payments, the risks associated with electronic payments, and the countermeasures that firms engaged in digital business can take to manage these risks, especially in the area of detecting and combating fraud.

Understanding The Insider Threat

Sophie Engle, University of San Francisco, San Francisco, CA

04/19/2012

The insider threat is growing in importance, but remains difficult to define and model. Much of the problem stems from the difficulty of making a strict division between an "insider" versus an "outsider." To counter this, we focus on access-required by both insiders and outsiders to execute an attack to define the problem. Specifically, we look at access at different levels of abstraction: the types of access that an individual should have, the types of access an individual is configured to have, and the types of access an individual actually has given the implementations of the security controls in place. By examining how access differs at these different levels, we are able to better define and capture the insider threat.

Pages