Computer Fraud Word Search

Created by Susan M. Moncada, Ph.D., CPA, Indiana State University
Author Profile

Summary

The number of computer fraud and abuse techniques that exist is a staggering figure. This activity combines gaming theory with a short answer/matching, drill and practice activity to help students learn about the different types of computer fraud. It also has student classify each type of computer fraud as a computer attack, a social engineering method, malware, or some combination of the three.


Learning Goals

  • To understand how vulnerable computer systems are to fraud.
  • To understand the pervasiveness of computer fraud in terms of computer attacks, malware, and social engineering.
  • To identify each type of fraud as a computer attack, a social engineering method, or malware.Word Game image file

Higher Order Thinking Skills: Comprehension and analysis.

Context for Use

This activity coincides with a chapter on computer fraud and abuse covered in an accounting information systems course. The word search game is used near the end of the unit once computer fraud has been discussed. The exercise can be implemented as an end-of-class activity with students working in teams, a homework assignment, or a lecture enhanced activity.


The Fraud Word Search could also be used in introductory computer or forensic accounting courses as well.

Description and Teaching Materials

Teaching Notes and Tips

Students are expected to attend class having read the chapter on computer fraud.


When implemented as a lecture enhanced activity, students are only given the word search segment of the worksheet. The short answer items are presented to the class as a PowerPoint presentation. Students are asked to identify the correct terms for the definitions provided on each slide. Students are also asked to classify each term as a computer attack, a social engineering method, or malware. However, these classifications are not necessarily mutually exclusive. For example, a social engineering method could be used to orchestrate a computer attack.


Note: During fall semester, this activity is usually used near the end of October. As a result, a number of Halloween-related terms also appear in the word search. Students generally find this feature humorous.

Assessment

This activity serves as a self-formative assessment.
Students are also tested on these concepts on a unit examination.

References and Resources

Romney, Marshall B., & Paul J. Steinbart (2009) Accounting Information Systems, 11th ed, Pearson/Prentice Hall.