The Computer Fraud Challenge emphasizes the prevalence of computer fraud and abuse in today's electronic environment. The activity illustrates a variety of hacking and social engineering techniques that compromise confidential information, as well as malware that harms computers. By providing examples, some of which are derived from real world cases, this PowerPoint game ties theory to practice. The Computer Fraud Challenge is based on the television show Hollywood Squares. Contestants choose a celebrity and are prompted with a question related to computer fraud. The student choose to agree or disagree with responses provided by game celebrities, earning an X or O just like Tic-Tac-Toe. Two game files are provided in PowerPoint, each containing 27 different game scenarios. A solution set is provided for the instructor who can moderate the game as the host. Detailed teaching notes are provided with instructions and tips on using in class.
Type of Material:
Drill and Practice
Recommended Uses:
Recommended as in-class, instructor led game. This PowerPoint game can be played in class by having students divide into two teams with the instructor serving as the moderator.
If students bring their laptops to class, the game can be played in drill and practice pairs.
In the online environment, the game can be played during an online video session with the instructor sharing the screen The game can also be played individually outside of class time as a form of drill and practice.
Technical Requirements:
Web Browser and Microsoft PowerPoint. I used Firefox web browser, version 85 and PowerPoint for Microsoft365.
Identify Major Learning Goals:
Compare and contrast a variety of computer attack and abuse tactics.
Explain how some social engineering techniques are used to gain physical or logical access to computer resources.
Describe different types of malware used to harm computers.
Target Student Population:
College Lower Division, College Upper Division, Business, Accouning, Finance
Undergraduate Accounting Information Systems class
Prerequisite Knowledge or Skills:
Internal controls
Fraud
Accounting Information systems
Information systems
Content Quality
Rating:
Strengths:
Very creative gamed-based teaching tool that provides a fun way for students to learn a challenging topic
Learning material is current, supported by references both to textbook and relevant research-based resources
Game can be played in class, in student teams or individually by students to practice and learn content
Material ties in well with undergraduate curriculum for an Accounting Information Systems course
A lot of information could be learned in a short time
Concerns:
Students may try to access solutions if provided with the original PowerPoint slides, so it is recommended that the instructor control the slides while moderating in-class or presenting via online lecture
Potential Effectiveness as a Teaching Tool
Rating:
Strengths:
Material includes detailed instructor notes identifying learning objectives, prerequisite knowledge and suggested examples for class use
Material covers basic concepts related to computer fraud and builds progressively to demonstrate the relationship between concepts and introduce more advanced material.
Very easy to integrate this game into curriculum assignments, in class, via distance learning or as assigned homework or self-study
Material can be used to measure student outcomes; however, the instructor would need to record correct versus incorrect responses from students during game play
The game fosters an understanding of relationships among concepts.
Concerns:
Material is a very effective teaching tool, but will require the instructor to be actively involved in moderating the game and keeping the pace of play
Ease of Use for Both Students and Faculty
Rating:
Strengths:
Hollywood Squares type game just like tic-tac-toe is very easy for students to learn
Students will enjoy the fun characters and interactive design of the game
Game is of high design quality and is engaging and fun to play
Internet access is not necessary.
Concerns:
The PowerPoint file requires macros to be enabled, and may not run at all if security settings are not adjusted on the user’s computer
The PowerPoint file was originally created using Microsoft Office 2007 version and may not be compatible with newer versions of Microsoft Office.
Other Issues and Comments:
Teaching notes provided by the author note that the 27 scenarios included in each game represent a small sample of computer frauds perpetrated. After each scenario is covered, it is recommended that the instructor review the key aspects of the particular type of computer fraud. For each incorrect response provided by a celebrity, an explanation of that particular fraud should be provided as well. Students will want to know the difference. Some of the incorrect answers are purely fictitious terms or phrases.
Creative Commons:
Search by ISBN?
It looks like you have entered an ISBN number. Would you like to search using what you have
entered as an ISBN number?
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.