Pedagogy in Action > Library > Games > Examples > Computer Fraud Challenge

Computer Fraud Challenge

Susan M. Moncada, Ph.D., CPA (Illinois)
Department of Accounting, Finance, Insurance & Risk Management
Scott College of Business
Indiana State University
Author Profile


The Computer Fraud Challenge emphasizes the prevalence of computer fraud and abuse in today's electronic environment. The activity illustrates a variety of hacking and social engineering techniques that compromise confidential information, as well as malware that harms computers. By providing examples, some of which are derived from real world cases, this PowerPoint game ties theory to practice. The Computer Fraud Challenge is based on the television show Hollywood Squares. Contestants agree or disagree with responses provided by game celebrities.

Learning Goals

The purpose of this activity is to raise students' awareness of the pervasiveness of computer fraud and abuse. More specifically, the exercise will help students: 1) compare and contrast computer attack and abuse tactics, 2) explain how social engineering techniques are used to gain physical or logical access to computer resources, and 3) describe the different types of malware used to harm computers.

Context for Use

The Computer Fraud Challenge is an informal formative assessment activity to be used after students have studied computer fraud and abuse conducted in today's technology environment. The activity was designed specifically to supplement Chapter 6 of the Romney & Steinbart, 12e, Accounting Information Systems text.

  1. This PowerPoint game can be played in class by having students divide into two teams with the instructor serving as the moderator.
  2. If students bring their laptops to class, the game can be played in drill and practice pairs.
  3. In the online environment, the game can be played during an Eliminate Live session.
  4. The game can also be played individually outside of class time as a form of drill and practice.

Prerequisite Knowledge
- Familiarity with computer fraud and abuse techniques from course readings or class lecture.

Description and Teaching Materials

Teaching Notes and Tips


This activity is an informative self-assessment activity.

References and Resources

Romney, M.B., & Steinbart, P. J. (2012) Accounting Information Systems (Chapter 6, pp. 148-167), 12ed., New Jersey: Pearson Prentice Hall.

See more Examples »