Post a composite review
Unpost a composite review
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II


    

Peer Review


Computer Fraud Challenge

by Susan Moncada
 

Ratings

Overall Rating:

5 stars
Content Quality: 5 stars
Effectiveness: 4.75 stars
Ease of Use: 4.75 stars
Reviewed: Nov 17, 2012 by Business Editorial Board
Overview: The Computer Fraud Challenge is based on the television show Hollywood Squares. Contestants agree or disagree with responses provided by game celebrities. The activity illustrates a variety of hacking and social engineering techniques that compromise confidential information, as well as malware that harms computers. By providing examples, some of which are derived from real world cases, this PowerPoint game ties theory to practice.
Learning Goals: The purpose of this activity is to raise students’ awareness of the pervasiveness of computer fraud and abuse. More specifically, the exercise will help students: 1) compare and contrast computer attack and abuse tactics, 2) explain how social engineering techniques are used to gain physical or logical access to computer resources, and 3) describe the different types of malware used to harm computers.
Target Student Population: Accounting students who are covering computer fraud – most likely as part of an auditing course.
Prerequisite Knowledge or Skills: Completion of introductory accounting courses and possibly an introductory computer science course.
Type of Material: Drill and Practice.
Recommended Uses: 1. These PowerPoint games (2 versions) can be played in class by having students divide into two teams with the instructor serving as the moderator. 2. If students bring their laptops to class, the game can be played in drill and practice pairs. 3. In the online environment, the game can be played during an Eliminate Live session. 4. The game can also be played individually outside of class time as a form of drill and practice.
Technical Requirements: Microsoft PowerPoint 2007 or later version.

Evaluation and Observation

Content Quality

Rating: 5 stars
Strengths: A good tool to reinforce student understanding of basic terms and definitions from an Introductory Information Systems course.
Concerns: None.

Potential Effectiveness as a Teaching Tool

Rating: 4.75 stars
Strengths: This is a wonderfully engaging exercise with eight "celebrities": Cooker Booker, Phonie Business, W.C. Crimes, Bootleg Buccaneer, The Masked Hacker, Samuel Sharkie, Sneaks Ratter, Debit Deville and Identity Theftly. The activity can be used in multiple settings within the class, on-line or for self- study. Also the game setting and the ability to have students competing against each other provide a fun, engaging environment for students.
Concerns: It would be of benefit if incorrect responses were simply acknowledged without the correct responses being provided. That way the question could be repeated until the correct answer was provided.

Ease of Use for Both Students and Faculty

Rating: 4.75 stars
Strengths: The author’s game and related website are professionally done. The Computer Fraud Challenge only requires downloading the PowerPoint file for use in class or as an assignment.
Concerns: Instructions for changing the location of questions in the Teaching Notes were somewhat unclear.