The Sunday Standstill: An Accounting Information System Upgrade Role-Play
The role-play “The Sunday Standstill” bridges the gap between theoretical frameworks and real-world decision-making in accounting information systems (AIS). The role-play focuses on information security policy violations, internal control weaknesses, IT governance challenges using the COSO and COBIT frameworks, and the fraud triangle. This role-play is designed to achieve key learning goals, including strengthening students’ understanding of information security deficiencies, risk assessment, internal controls, critical thinking, professional skepticism, and enhancing collaboration and communication skills. Unlike traditional case studies, this role-play fosters active decision-making in complex, ambiguous situations, preparing students for professional challenges. Students find this exercise both exciting and relevant. The role-play is appropriate for undergraduate accounting information systems, IT audit, and assurance types of courses.Abstract
Individuals significantly influence the effectiveness of their organizations’ information and cybersecurity practices (Burns et al., 2018; Posey & Folger, 2020). Since the implementation of the Sarbanes-Oxley Act (SOX) of 2002, there has been an increased focus on training accountants to assess risk and strengthen internal controls, particularly those related to information systems.
To aid with the risk assessment of organizations, frameworks such as the control deficiency evaluation framework found in Auditing Standard No. 5 (AS5) of the Public Company Accounting Oversight Board (PCAOB), the Committee of Sponsoring Organizations of the Treadway Commission (COSO), and the Control Objectives for Information and Related Technologies (COBIT) created by ISACA have been instrumental. These frameworks help companies create a strong culture of cybersecurity practices and effective information security policies (ISPs) to prevent and detect cybersecurity attacks (Bee et al., 2021; Haywood-Sullivan, 2022).
Despite these efforts, research has shown that employees are often the weakest link in information security (Bulgurcu et al., 2010; Martins & Elofe, 2002; Posey & Folger, 2020). Research also shows that high-stress conditions induce a tendency toward unethical behavior, such as ISP violations (Kouchaki & Desai, 2015; Selart & Johansen, 2011). These findings underscore the importance of integrating employee-focused strategies into risk management frameworks to address the human factors in cybersecurity more effectively.
A role-play is an active learning strategy that simulates real-world scenarios, allowing participants to assume specific roles and engage in interactions that mirror actual workplace situations. By placing students in these roles, role-play encourages critical thinking, problem-solving, and collaboration (Powell et al., 2020). Participants navigate complex situations, respond to challenges, and make decisions as their assigned characters, mimicking the dynamics of real-life decision-making in organizations.
In this paper, we develop a teaching case based on role-play that provides an interactive approach to engaging students with the challenges of ISP violations. The case uses the COSO and COBIT frameworks as tools for risk assessment (Lehmann & Hao, 2020). Specifically, students critically examine different interpretations of ISP violation behaviors through these frameworks, exploring their potential consequences for individuals and organizations. Because the role-play incorporates the fraud triangle's focus on motivation, opportunity, and rationalization, students gain a deeper understanding of the drivers behind noncompliant behavior.
This multifaceted approach equips students with a comprehensive perspective on internal controls, IT governance, and the ethical dimensions of security policy compliance.
The Role-Play Overview
The role-play “The Sunday Standstill” simulates real-world Information Technology (IT) governance and Accounting Information Systems challenges, enabling students to apply theoretical frameworks, assess risks, and propose solutions in a collaborative setting. Inspired by a real-life situation encountered by one of the authors, the scenario ensures authenticity in its design. To enhance its relevance for today's classrooms, the situation has been adapted to reflect modern challenges in information systems governance, cybersecurity threats, and Enterprise Resource Planning (ERP) systems. By integrating the COSO framework, COBIT framework, and the fraud triangle, the role-play provides a structured approach for students to evaluate internal controls, identify potential risks, and understand the motivations behind noncompliant behaviors.
In the role-play, a company hires a consulting firm to upgrade its outdated, disconnected accounting and manufacturing systems. The current system lacks integration, requires manual payroll processing, and has IT security vulnerabilities, including shared login credentials and unsupported software. The planned ERP upgrade, co-led by a senior consultant and the company's technology director, aims to unify systems, improve data integration, enhance security, and streamline payroll. The upgrade begins on Friday night and is intended to be finished by Monday morning. However, on Sunday, the process freezes, locking the old and new systems and stalling progress. The team faces a tense standstill with no technical support available until Monday.
As the role-play unfolds, individual character backstories add layers of detail and tension, enriching the scenario and deepening the challenges the team encounters. Unlike traditional case studies, which present static narratives, the scenario evolves dynamically, presenting unexpected challenges to simulate real-world complexities. Students are initially given broad, deliberately vague instructions, but new details emerge as the role-play progresses, creating unexpected twists. Like a “whodunit mystery,” this scenario challenges students to apply their knowledge and problem-solving skills while adapting to evolving circumstances. This experience promotes collaboration and critical thinking, requiring students to embrace ambiguity and recognize that there may not be a single correct answer (Boyce et al., 2015).
The role-play also includes deliverables directly connecting to the course learning objectives. For instance, students apply COSO and COBIT principles to evaluate risks and propose controls while using the fraud triangle to assess potential unethical behaviors. These deliverables challenge students to think critically about the implications of their decisions and propose actionable solutions grounded in applicable frameworks. Instructors have flexibility in how they implement the role-play. The activity can be adapted to fit different class sizes, learning objectives, and time constraints. This role-play can provide an innovative approach to accomplishing specific course requirements.
Student feedback consistently highlights the role-play as engaging and highly relevant, emphasizing its value in fostering collaboration, critical thinking, and practical skills. The role-play bridges the gap between academic learning and professional preparation by encouraging students to grapple with complex and ambiguous scenarios.
Learning Objectives
The role-play is designed to support a range of learning objectives, allowing instructors to select which objectives to emphasize without needing to modify the activity. By incorporating a dynamic scenario, character backstories, targeted deliverables, and guided discussions, the role-play promotes mastery of common AIS course objectives while fostering critical thinking through the application of key frameworks and concepts:
COBIT Framework Analysis
Analyze the ERP failure, focusing on:
Governance: Improve IT governance considering leadership challenges.
Risk Management: Address credential and communication risks.
Compliance: Emphasize protocol adherence to prevent future issues.
Outcome: Enhance students’ ability to think critically about COBIT domains and their applications for governance and compliance.
COSO Framework Evaluation
Evaluate the ERP failure with COSO to identify weaknesses, focusing on:
Internal Controls: Examine how gaps contributed to ERP and payroll issues.
Risk Assessment: Identify risks from oversight and communication gaps.
Control Activities: Propose activities to enhance monitoring and fraud detection.
Outcome: Strengthen skills in applying COSO for internal controls and accountability.
Fraud Triangle Analysis
Analyze actions in the case using the fraud triangle, focusing on:
Fraud Elements: Explore opportunity, pressure, and rationalization in fraud.
Motivations: Investigate pressures leading to unethical behavior.
Mitigation Strategies: Develop strategies to reduce fraud opportunities.
Outcome: Encourage critical evaluation of fraud scenarios and effective strategies for mitigating unethical behavior.
Shadow IT Implications
Explore risks and governance for unauthorized IT use, focusing on:
Instances of Shadow IT: Identify and document unauthorized software use.
Risk Analysis: Assess risks like data breaches and compliance issues.
Governance Framework: Propose policies for monitoring shadow IT.
Outcome: Understand shadow IT risks and governance for IT resource management.
Ghost Employees and Payroll Fraud
Identify and address ghost employee risks, focusing on:
Occurrences: Document instances of ghost employees.
Financial & Ethical Impact: Evaluate financial losses and ethical implications.
Prevention Strategy: Develop audits and reports for accountability.
Outcome: Recognize payroll fraud risks and the importance of robust controls.
Information Security Policy (ISP) Review
Assess and enhance Blue House's ISP, focusing on:
Best Practice Alignment: Compare ISP against industry standards (NIST, ISO).
Vulnerability Identification: Identify gaps in access controls and data security.
Enhancements: Recommend updates, training, and incident response measures.
Outcome: Build an understanding of effective ISP in safeguarding organizational data.
The objectives listed can be adjusted to fit the needs of individual courses. Omitting or modifying the number of objectives will not change the scenario or the backstories. The scenario (Appendix A) and backstories (Appendix B) are designed to allow students to either focus on or overlook specific details, depending on the assigned deliverables.
Prerequisite Knowledge and Skills
Before engaging with this case, students should have a foundational understanding of several key frameworks and concepts for analyzing the situation. These include governance and risk management models, fraud prevention techniques, information security practices, and the challenges associated with unauthorized technology use. Table 1 outlines the essential prerequisites that students should be familiar with to effectively navigate the case and apply critical thinking to the analysis. Recommended readings, videos, and handouts have been provided, but textbooks from major publishers may also cover these prerequisite topics.

Implementation Guidance
To implement the role-play, we separate the case into two sections including 1) Initial Activities and 2) Running the Role-Play.
Initial Activities
For smooth facilitation, the initial activities should be completed before the role-play begins. These activities include reviewing the prerequisite topics (Table 1), preparing and printing the necessary tangible role-play materials (Appendices A and B), and scheduling how the role-play will fit into the class timeframes (e.g., one three-hour class versus two 75-minute classes) (Table 2).
Prerequisites: Reviewing or teaching the recommended prerequisite topics in Table 1 before the role-play ensures that all students understand the referenced AIS topics equally. The topics have been listed with a summary and links to additional resources. Additionally, course-specific textbook materials might cover the topics in detail.
Materials: Preparing the materials by printing the case study, backstories, name badges, and table tents before running the role-play is essential to guarantee a seamless role-play. Copies of the scenario, name tags, double-sided name plates, and individual character backstories are needed for every group of students. Materials can be printed or distributed digitally, but name tags and nameplates must be physical.
- ○
A PowerPoint (based on the Teaching Notes) with directions for conducting the role-play, guiding questions, and critical details is a helpful way to present a visual for both the instructor and the student. It can be adapted for an adjusted timetable (Table 2) and modified deliverables.
Timetable: The role-play can be conducted in a single class (∼3 hours) or divided into multiple sessions using the timetable (Table 2). The timetable lists minimum durations for each part of the role-play, allowing instructors to extend time as needed for each step.
- ○
Additionally, some activities (e.g., forming groups and reviewing prerequisite topics) may be completed online or assigned before class time begins. Strategic stopping points are included in the timetable as recommendations to allow for the duration of the class or as an opportunity for students to complete work outside class without disrupting the role-play's momentum.

Once the initial activities are complete, the role-play itself is ready to begin. The steps to run the role-play are outlined in a recommended sequence to ensure smooth progression and maintain engagement.
Running the Role-Play
The role-play is written in a framework like a “whodunit mystery,” where each participant only knows their part of the story until everyone begins to share and collect details from the other players. Slowly, the entire story comes together. Because students might not be familiar with “whodunit” role-plays, introducing the concept beforehand can help set expectations. Introducing the idea of a “whodunit mystery” could involve students sharing examples of movies where viewers try to solve a complex mystery.
It is also important to introduce students to the process of role-playing. Role-play is an active learning strategy that simulates real-world situations, allowing students to immerse themselves fully in their roles and treat the experience as a simulation of real-life organizational dynamics. Students should approach the activity as if they are putting on a school play, fully embracing their character's role and interacting naturally with others to bring the scenario to life. This immersive approach encourages critical thinking and real-world decision-making, enhancing students’ grasp and retention of key concepts.
Providing the rubric for role-play (Table 3) helps students focus on the necessary deliverables, avoid distractions, and align their efforts with the primary learning goals. Staying in character is essential for maximizing this immersive experience. Breaking character disrupts the flow, causes confusion, and may lead to missed opportunities for meaningful insights. Active participation ensures students uncover key details rather than relying on passive observation.
Form Groups:
- ○
Each group will perform the role-play. The groups should consist of six students corresponding to each of the six roles in the role-play. The groups should be organized in the classroom so that there is space between the groups to foster authentic discussion within each group. The case allows the selection of two choices in names for each character (e.g., Miranda or Matt, Sumi or Sam) to allow customization by the group.
If there are insufficient students for six-person groups, Brad and his related deliverables can be removed from the role-play.
Alternatively, several students can act out the role-play in front of the class while others observe. This approach provides less hands-on experience but offers a creative way to explore the material.
Introduce Scenario:
- ○
The instructor reads the scenario (Appendix A) to the class, stopping before the section titled 10:00 a.m. Meeting: The Confrontation. If possible, the instructor should distribute printed copies of the scenario to each group, ensuring students see only the approved sections. The backstories and later sections of the scenario should remain hidden until the appropriate time. To make sure students have a good understanding of the scenario and the concepts and frameworks (i.e., COBIT and COSO frameworks, fraud triangle, information security policies, ghost employees, and shadow IT), students have these tasks:
Deliverable 1 Organization Chart (Optional): Groups should create an organizational chart based on each involved company's scenario (Table 3), illustrating their interactions. While creating the organizational chart is an optional deliverable and not directly aligned with the learning objectives, it serves two valuable purposes.
Encourage collaboration.
Provide a visual reference during the role-play, clarifying roles and responsibilities.
Deliverable 1 Questions: To ensure understanding, students should answer the questions found in Table 3.
Distribute Backstories
- ○
After students complete Deliverable 1, the instructor distributes backstories (Appendix B), table tents, and name tags. Delaying this step ensures students work through the scenario systematically.
- ○
Students must wear name tags displaying their character name and role to reduce confusion, reinforce hierarchy, and simplify discussions with the instructor. To avoid confusion, group members must be addressed by their character's name.
- ○
Each group member will receive a character backstory (Appendix B) that only they will see, as each character's story contains unique information. This will ensure the “whole story” emerges as students decide what to share and when. It is important that each backstory be on its own page so that students only receive information about their role. Students should take time to read their backstory and refrain from talking amongst their group.
Deliverable 2 Timeline (Optional): Groups should be given time to create a timeline of events (Table 3). Students must only reveal character names and the guidepost times: ERP upgrade begins, ERP upgrade continues, ERP upgrade freezes, ERP upgrade is fixed and completed, upgrade process meeting, keeping backstory details confidential. While optional, the timeline encourages group collaboration and provides a visual reference during the role-play.
Continue Scenario: When ready, the faculty can pass out the remainder of the 10:00 a.m. Meeting: The Confrontation section and give the groups time to play out what will happen. Between the scenario and the individual backstories (Appendix B), students should be able to piece together what the day will look like. At this stage of the role-play, students will encounter the most ambiguity, as the scenario will unfold based on how each participant chooses to play their role.
- ○
The instructor should encourage students to immerse themselves fully in their roles and interact as their assigned characters, treating the experience like an improvisational play. Each student should use their character's name, engage naturally with others, and let interactions develop as they might in real life.
- ○
There is no specific script or exact way to play the role, so the interactions develop naturally. Students can share details from their character's backstory at their discretion, but they should avoid revealing too much at once.
Deliverable 3 Questions: After the role-play of the meeting, students will create a document to record their answers to the questions outlined in Table 3.
Hold Post-Mortem: The students must hold a post-mortem to reflect on the entire scenario and how the role-play unfolded.
Deliverable 4: A collaborative document will be created by all group members to answer the questions outlined in Table 3.
Class Discussion (Optional): This optional activity allows students to reflect on the role-play. Additionally, it can be a time when the instructor can act as a skeptic, taking on viewpoints that students might not have considered. For example, if most students believe that someone is guilty, it can be helpful to challenge them with reasons why the person may not be guilty. Sample alternative viewpoints are listed in the Teaching Notes. If time is not available for an in-class discussion, it can also occur online through a discussion board or be omitted altogether.
Group Presentation (Optional): After completing the role-play and Deliverables 1-4, the instructor may require students to participate in an optional group presentation.
Deliverable 5: This presentation can analyze the decisions made during the role-play, drawing on the ISP protocol, COSO and COBIT frameworks, and the fraud triangle. The presentation encourages further discussions and reinforces learning objectives. Alternative concluding deliverables could include short answer questions, test questions, or discussion board activities.

Deliverables
Table 3 outlines the role-play deliverables, which can be modified to align with various levels, goals, or course requirements.
Efficacy
The role-play was implemented across four AIS courses: three undergraduate courses, each with approximately 36 students, and one graduate course with around 20 students. The undergraduate courses primarily consisted of third- and fourth-year students, many of whom had internship experience in audit or tax. Similarly, the graduate students were mainly fifth-year seniors working to complete their 150-hour requirement, with comparable backgrounds in audit or tax internships.
To enhance the efficacy and realism of the role-play, the authors collaborated with an additional accounting instructor who reviewed the case and implemented it in their own class. Based on this feedback, revisions were made to refine the role-play, ensuring greater authenticity and a stronger focus on specific accounting challenges within organizations. These enhancements improved the alignment of the activity with real-world accounting practices, providing students with a more meaningful and immersive experiential learning opportunity.
Following the role-play, students responded to three prompts, sharing their impressions of the activity. This verbal feedback was then summarized for analysis, revealing no significant differences between the undergraduate and graduate groups. Despite natural variations in experience and course level, undergraduate and graduate students expressed similar perspectives.

Conclusion
Students entering accounting roles will be expected to work in technology-driven environments requiring information security and data management oversight. Role-play exercises represent a promising pedagogical method for facilitating a deeper and more critical understanding of decision-making related to AIS and evolving cybersecurity issues. This paper presents an experience report of a role-play exercise conducted in a medium-sized, four-year public university in the United States. Results suggest increased student engagement in applying concepts from the COSO and COBIT frameworks and applying professional skepticism and the fraud triangle to information security policy violations that may lead to catastrophic consequences for an organization. The role-play encourages students to express multiple points of view regarding cybersecurity, internal controls, and fraudulent financial activities. The material and suggestions provided in this report may also aid other faculty in facilitating a business role-play for students to collaborate and communicate professionally.