The Computer Fraud Challenge is based on the television show Hollywood Squares. Contestants agree or disagree with responses provided by game celebrities. The activity illustrates a variety of hacking and social engineering techniques that compromise confidential information, as well as malware that harms computers. By providing examples, some of which are derived from real world cases, this PowerPoint game ties theory to practice.
Type of Material:
Drill and Practice.
Recommended Uses:
1. These PowerPoint games (2 versions) can be played in class by having students divide into two teams with the instructor serving as the moderator.
2. If students bring their laptops to class, the game can be played in drill and practice pairs.
3. In the online environment, the game can be played during an Eliminate Live session.
4. The game can also be played individually outside of class time as a form of drill and practice.
Technical Requirements:
Microsoft PowerPoint 2007 or later version.
Identify Major Learning Goals:
The purpose of this activity is to raise students’ awareness of the pervasiveness of computer fraud and abuse. More specifically, the exercise will help students: 1) compare and contrast computer attack and abuse tactics, 2) explain how social engineering techniques are used to gain physical or logical access to computer resources, and 3) describe the different types of malware used to harm computers.
Target Student Population:
Accounting students who are covering computer fraud – most likely as part of an auditing course.
Prerequisite Knowledge or Skills:
Completion of introductory accounting courses and possibly an introductory computer science course.
Content Quality
Rating:
Strengths:
A good tool to reinforce student understanding of basic terms and definitions from an Introductory Information Systems course.
Concerns:
None.
Potential Effectiveness as a Teaching Tool
Rating:
Strengths:
This is a wonderfully engaging exercise with eight "celebrities": Cooker Booker, Phonie Business, W.C. Crimes, Bootleg Buccaneer, The Masked Hacker, Samuel Sharkie, Sneaks Ratter, Debit Deville and Identity Theftly. The activity can be used in multiple settings within the class, on-line or for self- study. Also the game setting and the ability to have students competing against each other provide a fun, engaging environment for students.
Concerns:
It would be of benefit if incorrect responses were simply acknowledged without the correct responses being provided. That way the question could be repeated until the correct answer was provided.
Ease of Use for Both Students and Faculty
Rating:
Strengths:
The author’s game and related website are professionally done.
The Computer Fraud Challenge only requires downloading the PowerPoint file for use in class or as an assignment.
Concerns:
Instructions for changing the location of questions in the Teaching Notes were somewhat unclear.
Creative Commons:
Search by ISBN?
It looks like you have entered an ISBN number. Would you like to search using what you have
entered as an ISBN number?
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.