public key encryption social engineering unified communications (UC) virtual reality information privacy media richness microformats distributed denial of service (DDoS) blog firewall encryption proxy information security digital rights management (DRM) phishing presence awareness intellectual property hastag utilitarianism multifactor authentication IMAP (Internet mail access protocol) natural laws and rights group decision support system (GDSS) web conferencing instant messaging (IM) risk matrix wiki botnets incidence response plan single sign-on malware ethics SMTP server war room virtual world telepresence shared workspace microblogging public key encryption social engineering unified communications (UC) virtual reality information privacy media richness microformats distributed denial of service (DDoS) blog firewall encryption proxy information security digital rights management (DRM) phishing presence awareness intellectual property hastag utilitarianism multifactor authentication IMAP (Internet mail access protocol) natural laws and rights group decision support system (GDSS) web conferencing instant messaging (IM) risk matrix wiki botnets incidence response plan single sign-on malware ethics SMTP server war room virtual world telepresence shared workspace microblogging
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
public key encryption
social engineering
unified communications (UC)
virtual reality
information privacy
media richness
microformats
distributed denial of service (DDoS)
blog
firewall
encryption
proxy
information security
digital rights management (DRM)
phishing
presence awareness
intellectual property
hastag
utilitarianism
multifactor authentication
IMAP (Internet mail access protocol)
natural laws and rights
group decision support system (GDSS)
web conferencing
instant messaging (IM)
risk matrix
wiki
botnets
incidence response plan
single sign-on
malware
ethics
SMTP server
war room
virtual world
telepresence
shared workspace
microblogging