phishing telepresence microblogging virtual reality SMTP server information security IMAP (Internet mail access protocol) group decision support system (GDSS) information privacy hastag wiki instant messaging (IM) war room intellectual property virtual world utilitarianism blog incidence response plan encryption natural laws and rights shared workspace single sign-on media richness firewall presence awareness public key encryption distributed denial of service (DDoS) microformats web conferencing digital rights management (DRM) malware ethics social engineering botnets proxy multifactor authentication risk matrix unified communications (UC) phishing telepresence microblogging virtual reality SMTP server information security IMAP (Internet mail access protocol) group decision support system (GDSS) information privacy hastag wiki instant messaging (IM) war room intellectual property virtual world utilitarianism blog incidence response plan encryption natural laws and rights shared workspace single sign-on media richness firewall presence awareness public key encryption distributed denial of service (DDoS) microformats web conferencing digital rights management (DRM) malware ethics social engineering botnets proxy multifactor authentication risk matrix unified communications (UC)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
phishing
telepresence
microblogging
virtual reality
SMTP server
information security
IMAP (Internet mail access protocol)
group decision support system (GDSS)
information privacy
hastag
wiki
instant messaging (IM)
war room
intellectual property
virtual world
utilitarianism
blog
incidence response plan
encryption
natural laws and rights
shared workspace
single sign-on
media richness
firewall
presence awareness
public key encryption
distributed denial of service (DDoS)
microformats
web conferencing
digital rights management (DRM)
malware
ethics
social engineering
botnets
proxy
multifactor authentication
risk matrix
unified communications (UC)