Email sent!
There has been an error, please check the information you entered and try again.
Skip to content

Teach Global Impact in CSP | Resources and Strategies

Lesson plans, classroom materials, and teaching strategies on the Global Impact of Computing. Portal to our collection of creative, engaging resources to support teachers of AP Computer Science Principles, and others who want to bring social impact into high school CS classrooms.

  • RESOURCES
    • Overview
    • Resources Database
    • TGI’s Materials
    • Discussion Bank
  • STRATEGIES
  • NEWS TO USE
  • ABOUT

Why We Should Not Know Our Own Passwords

March 20, 2017March 20, 2017 by Michael Morguarge
Michael Morguarge
1768
Published By: The Conversation, 3/9/2017 >> View the Article << Summary Elon University Professor Megan Squire looks into possible methods for protecting the data on your smartphone and social media accounts. The article focuses on potential searches…
More...

Twitter Researchers Offer Clues for Why Trump Won

March 6, 2017March 14, 2017 by Michael Morguarge
Michael Morguarge
1770
Published By: University of Rochester, 2/20/2017 >> View the Article << Summary Jiebo Luo and Yu Wang are using Twitter data to develop models that would correctly predict the result of the 2016 presidential election. They are…
More...

New Internet Security Device Launched to Safeguard Schools Against Child Abuse

February 27, 2017March 14, 2017 by Michael Morguarge
Michael Morguarge
1986
Published By: Plymouth University, 2/20/2017 >> View the Article << Summary The University of Plymouth has developed ICAlert, an easy-to-install device that monitors network traffic and sends alerts if users try to access dangerous web content…
More...

A Chip Flaw Strips Away Hacking Protections for Millions of Devices

February 22, 2017 by John Daniell
John Daniell
1589
Published By: Wired, 2/14/2017 >> View the Article << Summary Dutch researchers have discovered a method of hacking commonly used microprocessors. Operating systems randomly assign the locations in memory where programs run, but this hack detects…
More...

Tech Companies Are Building Tiny, Personal AIs to Keep Your Messages Private

February 21, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1853
Published By: Quartz, 2/10/2017 >> View the Article << Summary Technology companies, such as Facebook and Google, are developing artificial intelligence systems (AI) for mobile devices to improve the privacy of messaging applications. New AI innovations…
More...

Voice Control Everywhere

February 20, 2017February 20, 2017 by Michael Morguarge
Michael Morguarge
1733
Published By: MIT News, 2/13/2017 >> View the Article << Summary A chip designed by MIT researchers may reduce the level of energy required to use speech recognition. This dedicated, application-specific speech-recognition chip will use up…
More...

New Smartwatch Software May Now Verify Your Signatures

February 14, 2017February 14, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1709
Published By: Phys.org, 1/30/2017 (university press release) >> View the Article << Summary Researchers from Tel Aviv University and Ben-Gurion University have developed new software that will allow smartwatches to verify handwritten signatures. This software monitors…
More...

Private Medical Data Is For Sale – and It’s Driving a Business Worth Billions

February 3, 2017February 2, 2017 by Anna Clark
Anna Clark
1764
Published By: The Guardian, 1/10/2017 >> View the Article << Summary Private medical data is a multi-million dollar industry that is growing rapidly, according to Adam Tanner at Harvard's Institute for Quantitative Social Science. When medical…
More...

This App Offers Personal Recommendations While Keeping Your Data Private

January 30, 2017February 8, 2017 by Michael Morguarge
Michael Morguarge
1370
Published By: MIT Technology Review, 1/23/2017 >> View the Article << Summary Researchers developed an app that suggests news stories using locally stored personal data. They are investigating ways to provide services to users without storing…
More...

Ultrasound Tracking Could Be Used to Deanonymize Tor Users

January 11, 2017January 17, 2017 by Julia Bernd
Julia Bernd
1996
Published By: Bleeping Computer, 1/3/2017 >> View the Article << Summary Cybersecurity researchers recently discovered that ultrasound cross-device tracking (uXDT), in which a web page plays an ultrasound signal that prompts nearby devices to identify themselves…
More...

CES 2017: Alexa Is the Word as Amazon’s AI Comes to More Devices

January 9, 2017January 9, 2017 by Nnamdi Onwumere
Nnamdi Onwumere
1318
Published By: NBC News, 1/6/2017 >> View the Article << Summary Alexa, Amazon's voice-operated artificial intelligence assistant, is becoming more widely used in a variety of products, as more companies build and implement Alexa-based systems. This…
More...

UK Surveillance Law Marks a “Worse Than Scary” Shift

November 30, 2016December 13, 2016 by John Daniell
John Daniell
1722
Published By: CNET, 11/29/2016 >> View the Article << Summary The Investigatory Powers Act, recently passed in the UK, will require telecom companies to store records of phone calls and websites visited for up to a…
More...

See all our CSP curated news:

  • News (126)

Or search by CSP framework tag:

1 Creativity 2 Abstraction 3 Data & Info 4 Algorithms 6 The Internet 7.1.1 Interaction and cognition 7.1.1C Social media 7.1.1E Access to info 7.1.1F Public data 7.1.1H Social sharing 7.1.1I GPS 7.1.1J Sensors 7.1.1L Assistive tech 7.1.1M Web collaboration 7.1.1N Breadth of change 7.1.1O Productivity 7.1.2 Scaling problem-solving 7.1.2C Human computation 7.1.2D Enhanced capabilities 7.1.2E Combined effort 7.1.2F Crowdsourcing 7.1.2G Mobile scaling 7.2.1 Impact in other fields 7.2.1A Data impact 7.2.1B Scientific computing 7.2.1C Sharing info 7.2.1E Scientific DBs 7.2.1F Moore’s law 7.2.1G Enabling creativity 7.3.1 Benefits and harm 7.3.1A Law and ethics 7.3.1E Censorship 7.3.1G Privacy 7.3.1H Data aggregation 7.3.1J Data collection 7.3.1K Search tracking 7.3.1L Privacy exploits 7.3.1Q Open source 7.4.1 Real-world contexts 7.4.1A Varied access 7.4.1C Equity and power 7.4.1D Digital divide 7.4.1E Funding 7.5.2 Evaluate sources 7.5.2A Credibility
« Previous 1 2 3 4 Next »
Teach Global Impact content is licensed by the International Computer Science Institute under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA).
  • RESOURCES
    • Overview
    • Resources Database
    • TGI’s Materials
    • Discussion Bank
  • STRATEGIES
  • NEWS TO USE
  • ABOUT

Teach Global Impact in CSP | Resources and Strategies