Post a composite review
Unpost a composite review



Peer Review

Computer Fraud Challenge

by Susan Moncada


Overall Rating:

5 stars
Content Quality: 5 stars
Effectiveness: 4.75 stars
Ease of Use: 4.75 stars
Reviewed: Nov 17, 2012 by Business Editorial Board
Overview: The Computer Fraud Challenge is based on the television show Hollywood Squares. Contestants agree or disagree with responses provided by game celebrities. The activity illustrates a variety of hacking and social engineering techniques that compromise confidential information, as well as malware that harms computers. By providing examples, some of which are derived from real world cases, this PowerPoint game ties theory to practice.
Learning Goals: The purpose of this activity is to raise students’ awareness of the pervasiveness of computer fraud and abuse. More specifically, the exercise will help students: 1) compare and contrast computer attack and abuse tactics, 2) explain how social engineering techniques are used to gain physical or logical access to computer resources, and 3) describe the different types of malware used to harm computers.
Target Student Population: Accounting students who are covering computer fraud – most likely as part of an auditing course.
Prerequisite Knowledge or Skills: Completion of introductory accounting courses and possibly an introductory computer science course.
Type of Material: Drill and Practice.
Recommended Uses: 1. These PowerPoint games (2 versions) can be played in class by having students divide into two teams with the instructor serving as the moderator. 2. If students bring their laptops to class, the game can be played in drill and practice pairs. 3. In the online environment, the game can be played during an Eliminate Live session. 4. The game can also be played individually outside of class time as a form of drill and practice.
Technical Requirements: Microsoft PowerPoint 2007 or later version.

Evaluation and Observation

Content Quality

Rating: 5 stars
Strengths: A good tool to reinforce student understanding of basic terms and definitions from an Introductory Information Systems course.
Concerns: None.

Potential Effectiveness as a Teaching Tool

Rating: 4.75 stars
Strengths: This is a wonderfully engaging exercise with eight "celebrities": Cooker Booker, Phonie Business, W.C. Crimes, Bootleg Buccaneer, The Masked Hacker, Samuel Sharkie, Sneaks Ratter, Debit Deville and Identity Theftly. The activity can be used in multiple settings within the class, on-line or for self- study. Also the game setting and the ability to have students competing against each other provide a fun, engaging environment for students.
Concerns: It would be of benefit if incorrect responses were simply acknowledged without the correct responses being provided. That way the question could be repeated until the correct answer was provided.

Ease of Use for Both Students and Faculty

Rating: 4.75 stars
Strengths: The author’s game and related website are professionally done. The Computer Fraud Challenge only requires downloading the PowerPoint file for use in class or as an assignment.
Concerns: Instructions for changing the location of questions in the Teaching Notes were somewhat unclear.