ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Digital Nation | Arne Duncan: The Class of the Future
URL: https://www.pbslearningmedia.org/resource/arct15-sci-duncan/digital-nation-arne-duncan-the-class-of-the-future/
Description:

The Class of the Future: it may not meet in a classroom at all, and students may be learning a totally different set of skills, says Secretary of Education Arne Duncan, in this video from FRONTLINE: Digital Nation. In this video, Duncan talks about how the way students receive, process, and communicate information could change in the education world due to the everchanging digital world. 



   View Standards     Standard(s): [SS2010] WH9 (9) 15 :
15 ) Describe post-World War II realignment and reconstruction in Europe, Asia, and Latin America, including the end of colonial empires.

Examples: reconstruction of Japan; nationalism in India, Pakistan, Indonesia, and Africa; Chinese Communist Revolution; creation of the Jewish state of Israel; Cuban Revolution; Central American conflicts

•  Explaining origins of the Cold War
Examples: Yalta and Potsdam Conferences, "Iron Curtain," Truman Doctrine, Marshall Plan, United Nations, North Atlantic Treaty Organization (NATO), Warsaw Pact

•  Tracing the progression of the Cold War
Examples: nuclear weapons, European power struggles, Korean War, Berlin Wall, Cuban Missile Crisis, Vietnam War

[DLIT] (9-12) 28 :
22) Research the impact of computing technology on possible career pathways.

Examples: Government, business, medicine, entertainment, education, transportation.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Social Studies (9), Digital Literacy and Computer Science (9 - 12)
Title: The Cold War and Consumerism: Crash Course Computer Science #24
URL: https://aptv.pbslearningmedia.org/resource/cold-war-consumerism-crash-course-cs/cold-war-consumerism-crash-course-cs/
Description:

We’re going to step back from hardware and software, and take a closer look at how the backdrop of the cold war and space race and the rise of consumerism and globalization brought us from huge, expensive codebreaking machines in the 1940s to affordable handhelds and personal computers in the 1970s. This is an era that saw huge government-funded projects - like the race to the moon. And afterward, a shift towards the individual consumer, commoditization of components, and the rise of the Japanese electronics industry.



   View Standards     Standard(s): [DLIT] (9-12) 28 :
22) Research the impact of computing technology on possible career pathways.

Examples: Government, business, medicine, entertainment, education, transportation.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: The Personal Computer Revolution: Crash Course Computer Science #25
URL: https://aptv.pbslearningmedia.org/resource/personal-computer-revolution-crash-course-cs/personal-computer-revolution-crash-course-cs/
Description:

We're going to talk about the birth of personal computing. Up until the early 1970s components were just too expensive, or underpowered, for making a useful computer for an individual, but this would begin to change with the introduction of the Altair 8800 in 1975. In the years that follow, we'll see the founding of Microsoft and Apple and the creation of the 1977 Trinity: The Apple II, Tandy TRS-80, and Commodore PET 2001. These new consumer-oriented computers would become a huge hit, but arguably the biggest success of the era came with the release of the IBM PC in 1981. IBM completely changed the industry as its "IBM compatible" open architecture consolidated most of the industry except for, notably, Apple. Apple chose a closed architecture forming the basis of the Mac versus PC debate that rages today. But in 1984, when Apple was losing market share fast it looked for a way to offer a new user experience like none other - which we'll discuss next time.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Is the Internet Making You Meaner?
URL: https://www.pbslearningmedia.org/resource/internet-making-you-meaner-above-the-noise/internet-making-you-meaner-above-the-noise/
Description:

If the Internet's making you feel meaner, you're not imagining it. People really do act differently online than they do in person. Here’s why. According to a paper published in 2004 by psychologist John Suler, there are about 6 main reasons people act differently online. This could explain the rise of internet trolls or why people open up more online than they would in person. A student viewing guide with discussion questions is available to be used with this video. 



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Can You Trust Influencers on YouTube?
URL: https://www.pbslearningmedia.org/resource/advertising-youtube-kqed/can-you-trust-influencers-on-youtube-above-the-noise/
Description:

YouTube has been around for over a decade now, and it dominates as the top place for video content. Because of that, it’s way more of a business now than anyone could have imagined. The advertising world refers to many of the stars on YouTube, Instagram, and other social media platforms as influencers, because they have their own, home-grown fanbase that they have been interacting with for years. To capitalize on that fanbase, companies pay these influencers to promote their product or service. Watch the latest Above the Noise video to find out whether you can trust what's on YouTube and what are the rules about influencers advertising products in their videos. This video comes with a student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 23 :
17) Discuss the ethical ramifications of malicious hacking and its impact on society.

Examples: Dissemination of privileged information, ransomware.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Who's Snooping on You Online?
URL: https://www.pbslearningmedia.org/resource/online-privacy-tips-kqed/whos-snooping-on-you-online-above-the-noise/
Description:

With recent reports of high profile data breaches, ransomware attacks, and the prevalence of online trackers, it’s hard to know how best to protect your privacy online. In this Above the Noise video, we met up with the cybersecurity experts at Electronic Frontier Foundation to learn more about who’s snooping on us online and what we can do to protect ourselves. This video comes with a student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: When Do Memes Stop Being Funny?
URL: https://aptv.pbslearningmedia.org/resource/590e7fb3-e6ae-4cdf-b74f-e3810d6c57ad/when-do-memes-stop-being-funny-pbs-idea-channel/
Description:

"Old meme is old." But why is this such a bad thing? Once the height of internetiness, the sight of a LOLCat is now unforgivable. Memes become passe very quickly: after just months or even weeks of a new meme, we tire of the once hugely popular joke. Why does this happen, and so rapidly? Is it a reflection of the sheer volume of visual information we absorb from the internet? Or, does it say something about this specific visual culture? 



   View Standards     Standard(s): [DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Are LOLCats and Internet Memes Art?
URL: https://aptv.pbslearningmedia.org/resource/ccc3823a-585d-48ee-80a3-6b288a2eeec0/are-lolcats-and-internet-memes-art-pbs-idea-channel/
Description:

We've all seen and shared a few LOLCats and Internet Memes in our time, but is it possible that these images and videos are actually a new form of art? It may seem strange, but Rage Guys, Advice Dogs, Trollfaces, and Philosoraptors are ways for people around the globe to express their thoughts, feelings, and emotions with others - and isn't that the core principle of art? We think some of history's greatest philosophers and artists might be inclined to agree.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 23 :
17) Discuss the ethical ramifications of malicious hacking and its impact on society.

Examples: Dissemination of privileged information, ransomware.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Can Hackers Be Heroes?
URL: https://aptv.pbslearningmedia.org/resource/8721d2e3-c31a-44fa-acdd-2ef1aa18b6a3/can-hackers-be-heroes-off-book/
Description:

PBS's Off Book asks if hacking is inherently good or bad, or if is it an ethical area we have yet to define. Looking beyond the media hype and scare tactics, it is clear that "hacking" is a term that should be up for debate, and that some hackers could actually be heroes and not villains.



   View Standards     Standard(s): [DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Citizen Scientists
URL: https://aptv.pbslearningmedia.org/resource/citizen-scientists/citizen-scientists/
Description:

A new smartphone app is helping citizen scientists leave their mark.

Idaho State University researchers have developed an app for community input on the Portneuf River. Reporter Kris Millgate follows one family as they use the app to help stakeholders discover the places people value along the river.



   View Standards     Standard(s): [DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 33 :
27) Analyze assistive technologies and how they improve the quality of life for users.

Example: Research multiple speech to text technologies and write a persuasive essay in favor of one over another.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: How to Come Up With Your Own Mobile App
URL: https://aptv.pbslearningmedia.org/resource/62fd9efe-5be8-488e-90ef-d3a88779bc4b/toolkit-how-to-come-up-with-your-own-mobile-app/
Description:

Students will learn to see smartphone apps as tools to solve real-world problems. This lesson guides students through a design brainstorm process to invent an app idea related to public art. Students will be designing an app idea to tackle a problem related to public art in their community. All you need is the activity worksheet, some pens, markers, and creativity!

WHY APPS? Well, to start with, they’re everywhere. According to the Pew Research Center, 78% of teens now have a cell phone, and almost half (47%) of those own smartphones. Teens don’t have to be limited to the role of the consumer in today’s digital marketplace. All you need is a little know-how and an idea—which is the focus of this curriculum. 



   View Standards     Standard(s): [SS2010] SOC (9-12) 10 :
10 ) Describe social movement and social change.

•  Comparing various forms of collective behavior, including mobs, riots, fads, and crowds
•  Identifying major ethical and social issues facing modern society
Examples: technological, governmental, medical

•  Explaining the impact of the modern Civil Rights Movement, the women's movement, the gun rights movement, the green movement, and other minority movements in the United States
[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Social Studies (9 - 12), Digital Literacy and Computer Science (9 - 12)
Title: Civil Rights: Internet Activism and Social Change
URL: https://aptv.pbslearningmedia.org/resource/eotp16-soc-socialmedia/wgbh-world-channel-civil-rights-internet-activism-and-social-change/
Description:

This learning activity will examine social media’s influence on America’s Civil Rights movement and its role in democratizing the media. In this video from Eyes on the Prize: Then and Now, activists, including DeRay McKesson, use social media to support the work of social change protesters. Because communications are unmediated and occur in real-time, McKesson says, social media can help build community. Tamika Mallory calls social media a powerful asset, enabling people who have never met before to share information and support one another’s efforts. Bree Newsome points out that without social media, people might not even have heard of important cases—including those of Trayvon Martin, Mike Brown, and Sandra Bland. This video comes with a facilitator guide and student handout that helps guide the discussion of this activity.



   View Standards     Standard(s): [DLIT] (6) 35 :
29) Define artificial intelligence and identify examples of artificial intelligence in the community.

Examples: Image recognition, voice assistants.

[DLIT] (8) 34 :
28) Develop a logical argument for and against artificial intelligence.

Examples: Students debate the use of artificial intelligence in self-driving vehicles.
Students write a persuasive essay to argue for or against digital personal assistants.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

[DLIT] (9-12) 41 :
35) Appraise the role of artificial intelligence in guiding software and physical systems.

Examples: predictive modeling, self-driving cars.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Machine Learning & Artificial Intelligence: Crash Course Computer Science #34
URL: https://aptv.pbslearningmedia.org/resource/machine-learning-crash-course-cs/machine-learning-crash-course-cs/
Description:

From spam filters and self-driving cars to cutting edge medical diagnosis and real-time language translation, there has been an increasing need for our computers to learn from data and apply that knowledge to make predictions and decisions. This is the heart of machine learning which sits inside the more ambitious goal of artificial intelligence.



   View Standards     Standard(s): [DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

[DLIT] (9-12) 41 :
35) Appraise the role of artificial intelligence in guiding software and physical systems.

Examples: predictive modeling, self-driving cars.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Natural Language Processing: Crash Course Computer Science #36
URL: https://aptv.pbslearningmedia.org/resource/natural-language-processing-crash-course-cs/natural-language-processing-crash-course-cs/
Description:

As computers play an increasing role in our daily lives there has been a growing demand for voice user interfaces, but speech is also terribly complicated. Vocabularies are diverse, sentence structures can often dictate the meaning of certain words, and computers also have to deal with accents, mispronunciations, and many common linguistic faux pas.



   View Standards     Standard(s): [DLIT] (9-12) 8 :
2) Explain how computing systems are often integrated with other systems and embedded in ways that may not be apparent to the user.

Examples: Millions of lines of code control the subsystems within an automobile (e.g., antilock braking systems, lane detection, and self-parking).

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Psychology of Computing: Crash Course Computer Science #38
URL: https://aptv.pbslearningmedia.org/resource/psychology-computing-crash-course-cs/psychology-computing-crash-course-cs/
Description:

This video will discuss some psychological considerations in building computers, like how to make them easier for humans to use, the uncanny valley problem when humanoid robots get more and more humanlike, and strategies to make our devices work better with us by incorporating our emotions and even altering our gaze.



   View Standards     Standard(s): [DLIT] (9-12) 28 :
22) Research the impact of computing technology on possible career pathways.

Examples: Government, business, medicine, entertainment, education, transportation.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

[DLIT] (9-12) 41 :
35) Appraise the role of artificial intelligence in guiding software and physical systems.

Examples: predictive modeling, self-driving cars.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: The Singularity, Skynet, and the Future of Computing: Crash Course Computer Science #40
URL: https://aptv.pbslearningmedia.org/resource/singularity-skynet-future-crash-course-cs/singularity-skynet-future-crash-course-cs/
Description:

In the past 70 years, electronic computing has fundamentally changed how we live our lives, and we believe it’s just getting started. From ubiquitous computing, artificial intelligence, and self-driving cars to brain-computer interfaces, wearable computers, and maybe even the singularity there is so much amazing potential on the horizon.



   View Standards     Standard(s): [DLIT] (9-12) 28 :
22) Research the impact of computing technology on possible career pathways.

Examples: Government, business, medicine, entertainment, education, transportation.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Early Computing: Crash Course Computer Science #1
URL: https://aptv.pbslearningmedia.org/resource/early-computing-crash-course-cs/early-computing-crash-course-cs/
Description:

Welcome to Crash Course Computer Science! This video will take a look at computing’s origins because even though our digital computers are relatively new, the need for computation is not.



   View Standards     Standard(s): [DLIT] (9-12) 28 :
22) Research the impact of computing technology on possible career pathways.

Examples: Government, business, medicine, entertainment, education, transportation.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Electronic Computing: Crash Course Computer Science #2
URL: https://aptv.pbslearningmedia.org/resource/electronic-computing-crash-course-cs/electronic-computing-crash-course-cs/
Description:

We ended the last episode at the start of the 20th century with special-purpose computing devices such as Herman Hollerith’s tabulating machines. But the scale of human civilization continued to grow, as did the demand for more sophisticated and powerful devices. Soon, these cabinet-sized electro-mechanical computers would grow into room-sized behemoths that were prone to errors. But it was these computers that would help usher in a new era of computation - electronic computing.



   View Standards     Standard(s): [DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 27 :
21) Explain how technology facilitates the disruption of traditional institutions and services.

Examples: Digital currencies, ridesharing, autonomous vehicles, retail, Internet of Things.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Debating the Privacy Line
URL: https://www.commonsense.org/education/digital-citizenship/lesson/debating-the-privacy-line
Description:

Often, the more information we have, the better decisions we're able to make. The power of data can benefit both individuals and governments. But who can be trusted with the responsibility of having all this data? Can governments collect and use it fairly and without violating our privacy? Help students think through this question and become thoughtful influencers of data policy and practice.

Students will be able to:
  • Identify the pros and cons of schools having access to students' social media.
  • Describe the concerns related to government access to social media and cellphone data, including those related to free speech and privacy.
  • Choose a position for or against government access to social media and cellphone data, and support that position with reasons and examples.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (9-12) 3 :
R3) Assess the validity and identify the purpose of digital content.

[DLIT] (9-12) 27 :
21) Explain how technology facilitates the disruption of traditional institutions and services.

Examples: Digital currencies, ridesharing, autonomous vehicles, retail, Internet of Things.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Filter Bubble Trouble
URL: https://www.commonsense.org/education/digital-citizenship/lesson/filter-bubble-trouble
Description:

When we get news from our social media feeds, it often only tells us part of the story. Our friends -- and the website's algorithms -- tend to feed us perspectives we already agree with. Show students ways to escape the filter bubble and make sure their ideas about the world are being challenged.

Students will be able to:
  • Define "filter bubble" and explain how it occurs.
  • Reflect on the limitations and drawbacks that filter bubbles cause.
  • Identify strategies for escaping their own filter bubbles.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 22 :
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Your Information Footprint is Larger Than You Think
URL: https://teachingprivacy.org/module-1-youre-leaving-footprints/
Description:

The lesson elements in this module teach students about the privacy principle “Your information is larger than you think”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student lesson is available at https://teachingprivacy.org/youre-leaving-footprints/.

Summary of Learning Objectives: Students can enumerate ways their online and offline activities contribute to their information “footprint”; students can use privacy settings and critical thinking skills to limit the exposure of their footprint.

Target Age: High school, college undergraduate.

Learning Objectives: 
  1. Students can give examples of ways their online and offline activities generate digital footprints, within each of the following broad categories: intentional posting/online activities, metadata attached to posts, information transmitted by devices, and others collecting or posting information about them.
  2. For at least one example of an activity that generates digital footprints, students can explain (at least in non-technical terms) how that activity generates those footprints.
  3. Students can enumerate some factors that affect how many people or entities can see the data in their information footprint, including (minimally) privacy settings and third-party data sharing, and give examples of potential negative consequences of exposure.
  4. Students can explain how the amount of information available about them, and how many people have access to it, is affected by the mining of data from different sources to form a picture of each person and can give examples of inferences that can be drawn by data-mining.
  5. Students can give examples of available privacy settings for apps, online services, and devices they use frequently, and explain why they would choose particular settings based on their information-sharing preferences.
  6. Students can suggest some potential uses apps and online services might have for particular types of personal data they typically request access to and evaluate whether those uses would likely be beneficial, neutral, or harmful to the student.


   View Standards     Standard(s): [DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 20 :
14) Compare ways to protect devices, software, and data.

[DLIT] (9-12) 25 :
19) Prove that digital identity is a reflection of persistent, publicly available artifacts.

[DLIT] (9-12) 26 :
20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world.

[DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: There’s No Anonymity
URL: https://teachingprivacy.org/module-2-theres-no-anonymity/
Description:

The lesson elements in this module teach students about the privacy principle “There is no anonymity on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/theres-no-anonymity/.

Summary of Learning Objectives: Students can explain (in general terms) how data tracked by online services can be used to identify them; students can use tools and techniques to reduce the effectiveness of tracking.

Target Age: High school, college undergraduate.

Learning objectives:

  1. Students can explain (in general terms) how data aggregation, data mining, and inference are carried out and can give examples of how these techniques can be used to match “anonymous” users to their real identities.
  2. Students can explain what online behavioral tracking is, can give examples of what types of information can be gathered about them, and can give examples of how personal devices can be used to track and collect that information.
  3. Students can give examples of what types of information can still be collected by websites when they are using their browser’s “private browsing” or “incognito” mode.
  4. Students can explain how the amount and type of information available about them online affects the likelihood that someone can connect their online personas with their offline identities.
  5. Students can give examples of effective tools and techniques that reduce the ability of websites, apps, and services to track their online behavior, explain (in general terms) how they work, and enumerate some of their limitations.


   View Standards     Standard(s): [DLIT] (9-12) 29 :
23) Debate the positive and negative effects of computing innovations in personal, ethical, social, economic, and cultural spheres.

Examples: Artificial Intelligence/machine learning, mobile applications, automation of traditional occupational skills.

[DLIT] (9-12) 41 :
35) Appraise the role of artificial intelligence in guiding software and physical systems.

Examples: predictive modeling, self-driving cars.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Artificial Intelligence
URL: https://csfieldguide.org.nz/en/chapters/artificial-intelligence/
Description:

Artificial Intelligence conjures up all sorts of images – perhaps you think of friendly systems that can talk to you and solve tough problems; or maniac robots that are bent on world domination? There's the promise of driverless cars that are safer than human drivers, and the worry of medical advice systems that hold people's lives in their virtual hands. The field of Artificial Intelligence is a part of computer science that has a lot of promise and also raises a lot of concerns. It can be used to make decisions in systems as large as an airplane or an autonomous dump truck, or as small as a mobile phone that accurately predicts text being typed into it. What they have in common is that they try to mimic aspects of human intelligence. And importantly, such systems can be of significant help in people's everyday lives.

AI (also known as intelligent systems) is primarily a branch of computer science but it has borrowed a lot of concepts and ideas from other fields, especially mathematics (particularly logic, combinatorics, statistics, probability and optimization theory), biology, psychology, linguistics, neuroscience, and philosophy.

In this chapter, we'll explore a range of these intelligent systems. Inevitably this will mean dealing with ethical and philosophical issues too – do we really want machines to take over some of our jobs? Can we trust them? Might it all go too far one day? What do we really mean by a computer being intelligent? While we won't address these questions directly in this chapter, gaining some technical knowledge about AI will enable you to make more informed decisions about the deeper issues.



ALEX Classroom Resources: 23

Go To Top of page