Email sent!
There has been an error, please check the information you entered and try again.
Skip to content

Teach Global Impact in CSP | Resources and Strategies

Lesson plans, classroom materials, and teaching strategies on the Global Impact of Computing. Portal to our collection of creative, engaging resources to support teachers of AP Computer Science Principles, and others who want to bring social impact into high school CS classrooms.

  • RESOURCES
    • Overview
    • Resources Database
    • TGI’s Materials
    • Discussion Bank
  • STRATEGIES
  • NEWS TO USE
  • FORUM
    • Forum
      (home & search)
    • Login
      (to comment)
  • ABOUT

Google Overhauls Search Algorithm in Bid to Fight Fake News

May 1, 2017 by Anna Clark
Anna Clark
1287
Published By: The Telegraph, 4/25/2017 >> View the Article << Summary Google is changing their search algorithm to better distinguish websites that contain fake news, conspiracy theories, or extreme views from more reputable sources or websites.…
More...

Facebook Is Developing a Helicopter to Deliver Internet Access in Emergencies

April 24, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1179
Published By: The Verge, 4/20/2017 >> View the Article << Summary Facebook is developing a small helicopter to provide wireless Internet access in emergencies. Where cellular infrastructure is damaged, the "Tether-Tenna" helicopter would latch onto functioning…
More...

As Congress Repeals Internet Privacy Rules, Putting Your Options in Perspective

April 7, 2017April 10, 2017 by Anna Clark
Anna Clark
1065
Published By: National Public Radio, 3/28/2017 >> View the Article << Summary Rules made in October by the Federal Commercial Commission (FCC) are expected to be overturned by Congress and President Trump. These rules would have…
More...

Protecting Web Users’ Privacy

April 3, 2017April 6, 2017 by Michael Morguarge
Michael Morguarge
1327
Published By: MIT News, 3/23/2017 >> View the Article << Summary MIT and Stanford University researchers are developing Splinter, an encryption system that hides online database queries. Splinter splits up and encrypts the request for data,…
More...

Bridging a Digital Divide That Leaves Schoolchildren Behind

March 10, 2017March 10, 2017 by Anna Clark
Anna Clark
1482
Published By: The New York Times, 2/22/2017 >> View the Article << Summary The federal government is attempting to bridge the growing digital divide in low-income families by expanding a subsidy program, Lifeline, to include broadband Internet…
More...

Twitter Researchers Offer Clues for Why Trump Won

March 6, 2017March 14, 2017 by Michael Morguarge
Michael Morguarge
1006
Published By: University of Rochester, 2/20/2017 >> View the Article << Summary Jiebo Luo and Yu Wang are using Twitter data to develop models that would correctly predict the result of the 2016 presidential election. They are…
More...

Google Cousin Develops Technology to Flag Toxic Online Comments

March 2, 2017March 2, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
957
Published By: The New York Times, 2/23/2017 >> View the Article << Summary Google Alphabet has developed new software called Perspective that will flag potentially problematic user comments, for example so news sites can narrow down…
More...

Finding Credibility Clues on Twitter

February 6, 2017February 8, 2017 by Michael Morguarge
Michael Morguarge
1239
Published By: Georgia Tech News Center, 1/26/2017 >> View the Article << Summary Georgia Tech Researchers have created an early prototype system that uses a language model to predict the perceived credibility of social media messages,…
More...

This App Offers Personal Recommendations While Keeping Your Data Private

January 30, 2017February 8, 2017 by Michael Morguarge
Michael Morguarge
890
Published By: MIT Technology Review, 1/23/2017 >> View the Article << Summary Researchers developed an app that suggests news stories using locally stored personal data. They are investigating ways to provide services to users without storing…
More...

Will Blockchain-Based Election Systems Make E-Voting Possible?

January 23, 2017January 23, 2017 by Michael Morguarge
Michael Morguarge
838
Published By: Government Technology, 1/11/2017 >> View the Article << Summary Kaspersky Lab held a contest for researchers exploring the use of blockchain accounting to verify electronic voting. The goals included secure methods of counting votes…
More...

Microsoft, Code.org Target Beginner Coders With Minecraft Programme

December 12, 2016December 14, 2016 by Anna Clark
Anna Clark
1278
Published By: The Guardian (Nigeria), 12/9/2016 >> View the Article << Summary Mojang, Microsoft, and Code.org are teaming up to inspire a new generation of coders. The latest version of Code.org's Hour of Code is a…
More...
Clip from generic network-analysis visualization

Large DDoS Attacks Cause Outages at Twitter, Spotify, and Other Sites

October 26, 2016November 11, 2016 by John Daniell
John Daniell
984
Published By: TechCrunch, 10/21/2016 >> View the Article << Summary A recent large scale DDoS (distributed denial of service) attack on DNS provider Dyn caused many sites to become temporarily inaccessible, including Twitter, Spotify, and a…
More...

See all our CSP curated news:

  • News (126)

Or search by CSP framework tag:

1 Creativity 2 Abstraction 3 Data & Info 4 Algorithms 6 The Internet 7.1.1 Interaction and cognition 7.1.1C Social media 7.1.1E Access to info 7.1.1F Public data 7.1.1H Social sharing 7.1.1I GPS 7.1.1J Sensors 7.1.1L Assistive tech 7.1.1M Web collaboration 7.1.1N Breadth of change 7.1.1O Productivity 7.1.2 Scaling problem-solving 7.1.2C Human computation 7.1.2D Enhanced capabilities 7.1.2E Combined effort 7.1.2F Crowdsourcing 7.1.2G Mobile scaling 7.2.1 Impact in other fields 7.2.1A Data impact 7.2.1B Scientific computing 7.2.1C Sharing info 7.2.1E Scientific DBs 7.2.1F Moore’s law 7.2.1G Enabling creativity 7.3.1 Benefits and harm 7.3.1A Law and ethics 7.3.1E Censorship 7.3.1G Privacy 7.3.1H Data aggregation 7.3.1J Data collection 7.3.1K Search tracking 7.3.1L Privacy exploits 7.3.1Q Open source 7.4.1 Real-world contexts 7.4.1A Varied access 7.4.1C Equity and power 7.4.1D Digital divide 7.4.1E Funding 7.5.2 Evaluate sources 7.5.2A Credibility
1 2 Next »
Teach Global Impact content is licensed by the International Computer Science Institute under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA).
  • RESOURCES
    • Overview
    • Resources Database
    • TGI’s Materials
    • Discussion Bank
  • STRATEGIES
  • NEWS TO USE
  • FORUM
    • Forum
      (home & search)
    • Login
      (to comment)
  • ABOUT

Teach Global Impact in CSP | Resources and Strategies