Affordances and Constraints of Emails
Information and technology, ICT is defined by (Tinio, 2003) as the diverse set of technological tools and other resources that are utilized to create, store, disseminate, communicate and manage information. Among many of these technologies are computers, the Internet, broadcasting agents such as radio and television, as well as the telephone. She also went on to state that newer digital technologies like the Internet and computers are quite likely to be instrumental tools in accommodating change and reform in education.
The Internet is a very powerful resource in the range of ICT technologies that are available for use to enhance learning and education. There are numerous affordances that the Internet permits. Gibson (1977) asserts that the term affordance is used to describe the many possible actions that are posed by objects in the real world. According to psychologist Gibson, the objects in the environment have values and meanings, some of which we should adapt to, some we should ignore and others we have to assert our will. Those objects that call for direct action are the ones we should describe as affordances. He coined the term affordance to describe how an organism and its environment assimilate. Ryder and Wilson (1996) used the term affordance to refer to the potential for action. It is the perception that one has of the ability of an object to carry out the function which is demanded of it.
The Internet is a very powerful resource in the range of ICT technologies that are available for use to enhance learning and education. There are numerous affordances that the Internet permits. Gibson (1977) asserts that the term affordance is used to describe the many possible actions that are posed by objects in the real world. According to psychologist Gibson, the objects in the environment have values and meanings, some of which we should adapt to, some we should ignore and others we have to assert our will. Those objects that call for direct action are the ones we should describe as affordances. He coined the term affordance to describe how an organism and its environment assimilate. Ryder and Wilson (1996) used the term affordance to refer to the potential for action. It is the perception that one has of the ability of an object to carry out the function which is demanded of it.
![Picture](/uploads/2/5/1/9/25197189/4346699.jpg?259)
Emails is one of the communication methods that is most ubiquitous and perhaps most useful in any organization and even the wider community. The demise of the postal system is believed to be directly attributed to the birth of the email. Although the email is a highly desirable means of communication in today’s society, it by no means replaces the face to face communication that we social beings are forever longing for.
Email is one of the affordances that can be utilized as an ICT tool for facilitating learning through the Internet. Through emailing, a social atmosphere is developed and cultivated among learners as well as between facilitators and learners. In an educational environment email can be used by facilitators to transmit much needed course related communication to students so that they all have access to the same information. This medium affords learners the opportunity of responding or reacting to the material. Example, if a teacher is late in providing assignment for students, the assignment can be emailed to the students or their parents. Also, if the facilitator needs immediate feedback on an issue, this is a very good forum through which it can be channeled.
![Picture](/uploads/2/5/1/9/25197189/65125.jpg?298)
Personal information can also be transmitted between facilitators and learners. This avenue facilitates one on one interaction which affords persons the option of choosing who they want to receive their message. Learners can also use this affordance to share information which they have accessed, if they are working on a group project, so that everyone in the group can contribute meaningfully to the final product.
Email is a social medium. Users have the capacity to develop a community of friends, with which much socialization can take place, as they share personal information, ideas, pictures and make friends. The ability to provide feedback to an email makes communication fast and effective, as well as promote dialogue between the parties involved. Emails transcend physical space and so persons do not all need to be in the same location to participate. This is a great avenue for the accommodation of various diverse cultural perspectives that create an impact on an activity.
Email is a social medium. Users have the capacity to develop a community of friends, with which much socialization can take place, as they share personal information, ideas, pictures and make friends. The ability to provide feedback to an email makes communication fast and effective, as well as promote dialogue between the parties involved. Emails transcend physical space and so persons do not all need to be in the same location to participate. This is a great avenue for the accommodation of various diverse cultural perspectives that create an impact on an activity.
However, with affordances of ICT tools emanates certain constraints that are associated with its use. The theory of constraints was described as a set of principles and tools or methods for solving the problem of improving overall system performance (Goldratt, 1990).
In relation to emails, unreliable internet services can be a major hindrance, thus delaying the time frame in which information will be received, retrieved and responded to. The operating system on the device may not be compatible with certain elements of modern day programs. Example, PDF files may be inaccessible from some operating systems, or files may be too big to be opened. Furthermore, incompetence in the use of this affordance would make it unlikely for persons to access their mails. Individuals may also use this medium as an avenue for perpetuating negative activities such as bullying.
In relation to emails, unreliable internet services can be a major hindrance, thus delaying the time frame in which information will be received, retrieved and responded to. The operating system on the device may not be compatible with certain elements of modern day programs. Example, PDF files may be inaccessible from some operating systems, or files may be too big to be opened. Furthermore, incompetence in the use of this affordance would make it unlikely for persons to access their mails. Individuals may also use this medium as an avenue for perpetuating negative activities such as bullying.
![Picture](/uploads/2/5/1/9/25197189/3077249.jpg?294)
Support for the affordance of emails as an ICT tool is found in the Problem-based learning theory. For this engagement, learners can use the tool to source perspectives from diverse audiences in order to apply to a problem, to come up with the most feasible and applicable solution. The Social Learning theory also supports email as an ICT tool. By creating a community of contributors various perspectives can be obtained on a subject as persons interact within their social environment. This in itself promotes consistent dialogue which will be necessary for clarification of ideas, concepts, information and knowledge.
The Internet is another example of an affordance that can be found within the classroom or work environment. In a study, Ryder and Wilson (1996) found that the affordances of the Internet, the trends in education are moving toward a distributed, collaborative model of learning. They also determined that agency was shifting from center to periphery, from teacher to learner, from author to reader, from librarian to researcher, from curriculum to context. They argued that the affordances of the Internet have caused the explosion of public expression, allowing any school child to represent herself before a world-wide community of learners. They consider the affordances of information retrieval have advanced to the point where a simple query can yield a flood of information. However, a major constraint of the Internet is the fact that there is too much information (information overload) which might be very difficult for students to consume and analyze.
For youngsters, the Internet has proven to be a source of major headaches for parents. Kids visit websites they are not supposed to. Sometimes they provide their detailed information to strangers they meet online. Other times they are fooled into downloading software or clicking on links that could have detrimental effects to their computer hard drives. In addition, social websites have become a haven for ill-minded individuals such as pedophiles. Freeh, a director of The Federal Bureau of Investigation (FBI) cautions that while on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they experiment with exploring the information highway.
A fire-wall can be used to minimize the effects of this constraint. However, the best solution to this constraint is to educate the population on the downfall of this technology. Ryder and Wilson (1996) articulate that many persons are not able to manipulate internet tools like they have learnt to manipulate other ICT tools such as the library.
An additional affordance in the classroom is the smart phones. With this new form of technology students can readily receive updates from family and friends in the event something happens. The cell phones have the ability to allow users to user various tools such as calculator, internet, and so on to contact friends at any point in time. However, we have the nuances of the cell phones. Consider the countless number of times one could hear the sound of a cell phone in church, at a funeral or other weird places. These are constraints and nuances brought about by the over-dependence of the technology.
Smart phones pose a serious problem in the classroom. Students are constantly being distracted through the use of this technology. A very good solution to this problem is to create activities where students are assigned research work utilizing the smart phones to achieve their objectives.
Steps that can be taken to implement the solutions.
Internet
(a) Participants are introduced to the Internet and the wide array of information that are readily available.
(b)They will be required to research both the advantages and disadvantages of using the Internet.
(c) As a group, they will discuss methods to mitigate and protect us from many of the ill people on the Internet. The solutions could be categorized as both technical (use of fire-wall and other applications to filter the bad guys) and formal (use of education and training).
Smart Phones
(a) Students would be asked to discuss when they should be using smart phone and when not to use smart phones in the classroom.
(b) They will suggest reasons why the smart phones can impede the learning in the classroom.
(c) Students will be required to come up with guidelines on the use of the smart phones in the class.
(d) Students can list some of the circumstances in which the smart phones may be used in the classroom to cause harm to others.
References
Freeh, L.J.(Former Director). A Parent's Guide to Internet Safety. U.S. Department of Justice : Federal Bureau of Investigation. http://www.fbi.gov/stats-services/publications/parent-guide/parentsguide.pdf
Gibson, J.J. (1977). The theory of affordances. In R. Shaw & J. Bransford (eds.), Perceiving, Acting and Knowing. Hillsdale, NJ: Erlbaum.
Goldratt, E. M. (1990).Theory of constraints. North River.
Ryder, M. & Wilson, B. (1996). Affordances and Constraints of the Internet
for Learning and Instruction. Division of Learning and Performance Environments Research and Theory Division. Indianapolis.
Tinio, V. L. (2003). ICT in education. UNDP Asia-Pacific Development information Programme (APDIP). Retrieved from: http://www.saigontre.com/FDfiles/ ICT_in_Education.PDF
For youngsters, the Internet has proven to be a source of major headaches for parents. Kids visit websites they are not supposed to. Sometimes they provide their detailed information to strangers they meet online. Other times they are fooled into downloading software or clicking on links that could have detrimental effects to their computer hard drives. In addition, social websites have become a haven for ill-minded individuals such as pedophiles. Freeh, a director of The Federal Bureau of Investigation (FBI) cautions that while on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they experiment with exploring the information highway.
A fire-wall can be used to minimize the effects of this constraint. However, the best solution to this constraint is to educate the population on the downfall of this technology. Ryder and Wilson (1996) articulate that many persons are not able to manipulate internet tools like they have learnt to manipulate other ICT tools such as the library.
An additional affordance in the classroom is the smart phones. With this new form of technology students can readily receive updates from family and friends in the event something happens. The cell phones have the ability to allow users to user various tools such as calculator, internet, and so on to contact friends at any point in time. However, we have the nuances of the cell phones. Consider the countless number of times one could hear the sound of a cell phone in church, at a funeral or other weird places. These are constraints and nuances brought about by the over-dependence of the technology.
Smart phones pose a serious problem in the classroom. Students are constantly being distracted through the use of this technology. A very good solution to this problem is to create activities where students are assigned research work utilizing the smart phones to achieve their objectives.
Steps that can be taken to implement the solutions.
Internet
(a) Participants are introduced to the Internet and the wide array of information that are readily available.
(b)They will be required to research both the advantages and disadvantages of using the Internet.
(c) As a group, they will discuss methods to mitigate and protect us from many of the ill people on the Internet. The solutions could be categorized as both technical (use of fire-wall and other applications to filter the bad guys) and formal (use of education and training).
Smart Phones
(a) Students would be asked to discuss when they should be using smart phone and when not to use smart phones in the classroom.
(b) They will suggest reasons why the smart phones can impede the learning in the classroom.
(c) Students will be required to come up with guidelines on the use of the smart phones in the class.
(d) Students can list some of the circumstances in which the smart phones may be used in the classroom to cause harm to others.
References
Freeh, L.J.(Former Director). A Parent's Guide to Internet Safety. U.S. Department of Justice : Federal Bureau of Investigation. http://www.fbi.gov/stats-services/publications/parent-guide/parentsguide.pdf
Gibson, J.J. (1977). The theory of affordances. In R. Shaw & J. Bransford (eds.), Perceiving, Acting and Knowing. Hillsdale, NJ: Erlbaum.
Goldratt, E. M. (1990).Theory of constraints. North River.
Ryder, M. & Wilson, B. (1996). Affordances and Constraints of the Internet
for Learning and Instruction. Division of Learning and Performance Environments Research and Theory Division. Indianapolis.
Tinio, V. L. (2003). ICT in education. UNDP Asia-Pacific Development information Programme (APDIP). Retrieved from: http://www.saigontre.com/FDfiles/ ICT_in_Education.PDF