information privacy encryption public key encryption malware utilitarianism hastag digital rights management (DRM) firewall information security telepresence ethics proxy microformats social engineering microblogging risk matrix natural laws and rights distributed denial of service (DDoS) wiki web conferencing botnets shared workspace unified communications (UC) group decision support system (GDSS) virtual reality presence awareness war room intellectual property phishing SMTP server single sign-on virtual world instant messaging (IM) media richness blog multifactor authentication incidence response plan IMAP (Internet mail access protocol) information privacy encryption public key encryption malware utilitarianism hastag digital rights management (DRM) firewall information security telepresence ethics proxy microformats social engineering microblogging risk matrix natural laws and rights distributed denial of service (DDoS) wiki web conferencing botnets shared workspace unified communications (UC) group decision support system (GDSS) virtual reality presence awareness war room intellectual property phishing SMTP server single sign-on virtual world instant messaging (IM) media richness blog multifactor authentication incidence response plan IMAP (Internet mail access protocol)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
information privacy
encryption
public key encryption
malware
utilitarianism
hastag
digital rights management (DRM)
firewall
information security
telepresence
ethics
proxy
microformats
social engineering
microblogging
risk matrix
natural laws and rights
distributed denial of service (DDoS)
wiki
web conferencing
botnets
shared workspace
unified communications (UC)
group decision support system (GDSS)
virtual reality
presence awareness
war room
intellectual property
phishing
SMTP server
single sign-on
virtual world
instant messaging (IM)
media richness
blog
multifactor authentication
incidence response plan
IMAP (Internet mail access protocol)