Email sent!
There has been an error, please check the information you entered and try again.
Skip to content

Teach Global Impact in CSP | Resources and Strategies

Lesson plans, classroom materials, and teaching strategies on the Global Impact of Computing. Portal to our collection of creative, engaging resources to support teachers of AP Computer Science Principles, and others who want to bring social impact into high school CS classrooms.

  • RESOURCES
    • Overview
    • Resources Database
    • TGI’s Materials
    • Discussion Bank
  • STRATEGIES
  • NEWS TO USE
  • ABOUT

Startup Matroid Uses AI to Pluck Images From Streams of Video

April 4, 2017April 3, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1711
Published By: MSN/Bloomberg News, 3/26/2017 >> View the Article << Summary Reza Zadeh, a professor at Stanford University, has begun an artificial intelligence (AI) startup called Matroid whose software can detect specific people or objects in…
More...

Protecting Web Users’ Privacy

April 3, 2017April 6, 2017 by Michael Morguarge
Michael Morguarge
2376
Published By: MIT News, 3/23/2017 >> View the Article << Summary MIT and Stanford University researchers are developing Splinter, an encryption system that hides online database queries. Splinter splits up and encrypts the request for data,…
More...

Offline AI Revolution Awaits Smartphones

March 23, 2017March 22, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1799
Published By: Phys.org/AFP, 2/27/2017 >> View the Article << Summary A number of smartphone manufacturers are attempting to improve devices' offline functioning by using artificial intelligence (AI) and onboard data storage that leverages faster processors. Other…
More...

Why We Should Not Know Our Own Passwords

March 20, 2017March 20, 2017 by Michael Morguarge
Michael Morguarge
1768
Published By: The Conversation, 3/9/2017 >> View the Article << Summary Elon University Professor Megan Squire looks into possible methods for protecting the data on your smartphone and social media accounts. The article focuses on potential searches…
More...

Twitter Inches Forward in Fight Against Abuse

March 14, 2017March 14, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1908
Published By: The Huffington Post, 3/1/2017 >> View the Article << Summary Twitter is making efforts to crack down on harassment on their platform using several strategies: enhancing the Mute feature with new screening options, increasing…
More...

Machine-Learning Algorithms Can Predict Suicide Risk More Readily Than Clinicians, Study Finds

March 7, 2017March 6, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1450
Published By: Newsweek, 2/27/2017 >> View the Article << Summary Human clinicians are known not to be very accurate at predicting suicides, so researchers are developing machine-learning algorithms that use multiple factors to identify short-term suicide risk.…
More...

Twitter Researchers Offer Clues for Why Trump Won

March 6, 2017March 14, 2017 by Michael Morguarge
Michael Morguarge
1770
Published By: University of Rochester, 2/20/2017 >> View the Article << Summary Jiebo Luo and Yu Wang are using Twitter data to develop models that would correctly predict the result of the 2016 presidential election. They are…
More...

Google Cousin Develops Technology to Flag Toxic Online Comments

March 2, 2017March 2, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
2011
Published By: The New York Times, 2/23/2017 >> View the Article << Summary Google Alphabet has developed new software called Perspective that will flag potentially problematic user comments, for example so news sites can narrow down…
More...

Computer Crashes May Be Due to Forces Beyond Our Solar System

March 1, 2017March 14, 2017 by John Daniell
John Daniell
7195
Published By: Computer World, 2/17/2017 >> View the Article << Summary Interference from subatomic particles could be the cause of serious computer malfunctions at the hardware level. A single-event upset, or SEU, can disrupt microelectric circuitry,…
More...

New Internet Security Device Launched to Safeguard Schools Against Child Abuse

February 27, 2017March 14, 2017 by Michael Morguarge
Michael Morguarge
1985
Published By: Plymouth University, 2/20/2017 >> View the Article << Summary The University of Plymouth has developed ICAlert, an easy-to-install device that monitors network traffic and sends alerts if users try to access dangerous web content…
More...

Toyota Funds AI Research to Build Autonomous Cars

February 23, 2017February 23, 2017 by Anna Clark
Anna Clark
1507
Published By: Network World, 2/7/2017 >> View the Article << Summary Toyota is investing 50 million dollars and partnering with Stanford University and the Massachusetts Institute of Technology (MIT) to develop artificial intelligence and robotics technology…
More...

A Chip Flaw Strips Away Hacking Protections for Millions of Devices

February 22, 2017 by John Daniell
John Daniell
1589
Published By: Wired, 2/14/2017 >> View the Article << Summary Dutch researchers have discovered a method of hacking commonly used microprocessors. Operating systems randomly assign the locations in memory where programs run, but this hack detects…
More...

See all our CSP curated news:

  • News (126)

Or search by CSP framework tag:

1 Creativity 2 Abstraction 3 Data & Info 4 Algorithms 6 The Internet 7.1.1 Interaction and cognition 7.1.1C Social media 7.1.1E Access to info 7.1.1F Public data 7.1.1H Social sharing 7.1.1I GPS 7.1.1J Sensors 7.1.1L Assistive tech 7.1.1M Web collaboration 7.1.1N Breadth of change 7.1.1O Productivity 7.1.2 Scaling problem-solving 7.1.2C Human computation 7.1.2D Enhanced capabilities 7.1.2E Combined effort 7.1.2F Crowdsourcing 7.1.2G Mobile scaling 7.2.1 Impact in other fields 7.2.1A Data impact 7.2.1B Scientific computing 7.2.1C Sharing info 7.2.1E Scientific DBs 7.2.1F Moore’s law 7.2.1G Enabling creativity 7.3.1 Benefits and harm 7.3.1A Law and ethics 7.3.1E Censorship 7.3.1G Privacy 7.3.1H Data aggregation 7.3.1J Data collection 7.3.1K Search tracking 7.3.1L Privacy exploits 7.3.1Q Open source 7.4.1 Real-world contexts 7.4.1A Varied access 7.4.1C Equity and power 7.4.1D Digital divide 7.4.1E Funding 7.5.2 Evaluate sources 7.5.2A Credibility
« Previous 1 2 3 4 … 6 Next »
Teach Global Impact content is licensed by the International Computer Science Institute under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA).
  • RESOURCES
    • Overview
    • Resources Database
    • TGI’s Materials
    • Discussion Bank
  • STRATEGIES
  • NEWS TO USE
  • ABOUT

Teach Global Impact in CSP | Resources and Strategies