risk matrix instant messaging (IM) public key encryption presence awareness virtual reality telepresence information security unified communications (UC) IMAP (Internet mail access protocol) botnets utilitarianism malware virtual world war room web conferencing shared workspace wiki distributed denial of service (DDoS) microformats media richness ethics phishing proxy microblogging firewall digital rights management (DRM) multifactor authentication blog information privacy single sign-on incidence response plan encryption group decision support system (GDSS) natural laws and rights intellectual property hastag SMTP server social engineering risk matrix instant messaging (IM) public key encryption presence awareness virtual reality telepresence information security unified communications (UC) IMAP (Internet mail access protocol) botnets utilitarianism malware virtual world war room web conferencing shared workspace wiki distributed denial of service (DDoS) microformats media richness ethics phishing proxy microblogging firewall digital rights management (DRM) multifactor authentication blog information privacy single sign-on incidence response plan encryption group decision support system (GDSS) natural laws and rights intellectual property hastag SMTP server social engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
risk matrix
instant messaging (IM)
public key encryption
presence awareness
virtual reality
telepresence
information security
unified communications (UC)
IMAP (Internet mail access protocol)
botnets
utilitarianism
malware
virtual world
war room
web conferencing
shared workspace
wiki
distributed denial of service (DDoS)
microformats
media richness
ethics
phishing
proxy
microblogging
firewall
digital rights management (DRM)
multifactor authentication
blog
information privacy
single sign-on
incidence response plan
encryption
group decision support system (GDSS)
natural laws and rights
intellectual property
hastag
SMTP server
social engineering