According to the johari window what quadrant of the self is known both to others and to the self

Explorance is dedicated to protecting the data our customers entrust to us. This Privacy Policy outlines in clear and simple terms our approach to information security and data protection. It has recently been expanded to meet and exceed the requirements for the European Union’s General Data Protection Regulation (GDPR) and continues to uphold the regulations of other countries and states.

Our privacy policy governs both our sales & marketing practices and products & services. We have separated these two topics on this site to make it easier for you to find the information you are looking for. In both cases, we describe what information we collect, how it is used, our lawful basis for this usage, how we keep it secure, and your rights and the rights of all users of our products and services.

Sales & Marketing

What information do we collect?

We collect information from you when you register on our site, subscribe to our newsletter, respond to a survey or fill out a form. When requesting information or registering on our site, you will be asked to enter your name, e-mail address and/or phone number. You may, however, browse our site anonymously. Additionally, we use Google Analytics to track website usage metrics. Please see our cookie policy for more details.

How do we use this information?

The information we collect from you may be used to respond to a request for more information, personalize your experience, improve our website and customer service, and send you periodic emails such as newsletters, company news and related product information. All such email communications from Explorance will offer the option to opt-out of any similar notifications.

What is the lawful basis for using this information?

The primary basis is known as “legitimate interests”, that is, we have a good and fair reason to use your data and we do so in ways which do not infringe on your rights and interests. The second basis is to support our contractual obligations with our customers.

How is your data kept secure?

We use world-class software systems to securely store all information collected from our website and other sources related to sales and marketing. As well, Explorance has several internal data security policies and programs, including a direct marketing policy, an information security and data protection policy, a breach notification policy, and a company-wide security awareness training program. These policies are reviewed on a regular basis by our data protection governance team.

Is your data shared with third-parties?

No information collected through our website is sold to or shared for use by third parties. Information collected on our website is stored in secure systems and is accessed only by authorized personnel. However, we may release your information when we believe it is appropriate to comply with the law, enforce our site policies, or protect our or others rights, property, or safety.

What are your rights?

In addition to the right to know how your data is used and who it is shared with (which is covered above), your rights include the right to know what personal information we have collected, the right to receive a copy of that data, the right to make corrections, and to request that it be deleted. For all such requests, please contact your account manager or send an email to . We will be happy to address any concerns you have and assist in any way we can.

Products & Services

What information do we collect?

The set of personally identifiable information is defined by our customers (aka “controllers”), and is typically demographic data associated with the recipients of evaluations and surveys provided by our products.

Additionally, we collect and store certain types of information through passive collection tools, such as cookies and encrypted authentication tokens. Cookies are small text files placed on your computer which our products can retrieve later. If analytics are enabled, additional information may be collected such as fillout channel, type of browser and device, IP address, and operating system. Our products provide the option to use third-party analytics tools such as Google Analytics.

How do we use this information?

The information is processed as requested by the customer, which is typically reporting results from evaluations and surveys. Cookies and analytics data help us understand how you use our products, so that we can improve your user experience.

What is the lawful basis for using this information?

We process the data at the request of our customers, under contractual obligations which comply with local, state, provincial and federal legislation. This includes FERPA (Family Educational Rights and Privacy Act) , PIPEDA (Personal Information Protection and Electronic Documents Act), GDPR (General Data Protection Regulation), APP (Australian Privacy Principles) and PDPA (Personal Data Protection Act).

How is your data kept secure?

End-user access control is typically implemented via the customer’s authentication service. Our Blue hosted data center, based in Canada, is SOC 2 Type 2 certified, and Bluepulse, BlueX and MTM leverages Microsoft’s Azure regional data centers. Data transfers use secure ftp and https. As well, Explorance has several internal data security policies and programs, including an information security and data protection policy, a breach notification policy, and a company-wide security awareness training program. These policies are reviewed on a regular basis by our data protection governance team.

Is your data shared with third-parties?

No information collected through our products is shared with third parties without the explicit consent of an authorized customer representative.

What are the rights of end-users of our products?

It is the responsibility of the customer to inform their end-users of their rights and to uphold those rights based on their respective local regulations. That being said, Explorance’s products and services strive to uphold the privacy principles outlined in regulations such as GDPR, PIPEDA, FERPA, APP, PDPC, and we will support you and your end users in every way possible, including:

  • Right to be informed – Our products support customized messaging that can be used to inform your end-users.
  • Right to access and to data portability – Authorized administrators can extract the requested data from our products.
  • Right to correction – Authorized administrators can update data as required in all of our products.
  • Right to erasure – Personally identifiable data can be made anonymous upon request.
  • Right to restrict processing – Authorized administrators can disable processing by closing off tasks or updating profile information.
  • Right to object – This process is defined by individual customers as required by local legislation.
  • Rights related to automated decision making including profiling – Our products do not process data in this manner.

Terms and Conditions

Our Terms and Conditions establishes the use, disclaimers, and limitations of liability governing the use of our website. By using our site, you consent to these terms and conditions and to our online privacy policy.

Our SMS terms and conditions establishes the use, disclaimers, and limitations of liability governing the use of the Short Message Service (“SMS” or “Text Message”) features of our products and services.

Explorance is committed to a world-class standard of information security and will update its policies and products as global regulations evolve.

For further information, or to submit a complaint or request, please send an email to .

This privacy policy may be updated from time to time. Please revisit this page periodically to ensure you are aware of any changes.

This privacy policy was last updated on June 02, 2021.

Technique in personality development

According to the johari window what quadrant of the self is known both to others and to the self

Johari window

The Johari window is a technique[1] designed to help people better understand their relationship with themselves and others. It was created by psychologists Joseph Luft (1916–2014) and Harrington Ingham (1916–1995) in 1955, and is used primarily in self-help groups and corporate settings as a heuristic exercise.[2][3] Luft and Ingham named their model "Johari" using a combination of their first names.

Description

In the exercise, someone picks a number of adjectives from a list, choosing ones they feel describe their own personality. The subject's peers then get the same list, and each picks an equal number of adjectives that describe the subject. These adjectives are then inserted into a two-by-two grid of four cells.[4]

The philosopher Charles Handy calls this concept the Johari House with four rooms. Room one is the part of ourselves that we and others see. Room two contains aspects that others see but we are unaware of. Room three is the private space we know but hide from others. Room four is the unconscious part of us that neither ourselves nor others see.[5]

The four quadrants

Open The open area is that part of our conscious self – our attitudes, behavior, motivation, values, way of life – that we are aware of and that is known to others. We move within this area with freedom. We are "open books". Façade/hidden Adjectives selected by the subject, but not by any of their peers, go in this quadrant. These are things the peers are either unaware of, or that are untrue but for the subject's claim. Blind Adjectives not selected by subjects, but only by their peers go here. These represent what others perceive but the subject does not. Unknown Adjectives that neither the subject nor the peers selected go here. They represent the subject's behaviors or motives that no one participating recognizes—either because they do not apply or because of collective ignorance of these traits.

Johari adjectives

The participant can use adjectives like these as possible descriptions in the Johari window.[6]

  • able
  • accepting
  • adaptable
  • bold
  • brave
  • calm
  • caring
  • cheerful
  • clever
  • complex
  • confident
  • dependable
  • dictate
  • empathetic
  • energetic
  • extroverted
  • friendly
  • giving
  • happy
  • helpful
  • idealistic
  • independent
  • ingenious
  • intelligent
  • introverted
  • kind
  • knowledgeable
  • logical
  • loving
  • mature
  • modest
  • nervous
  • observant
  • organized
  • patient
  • powerful
  • proud
  • quiet
  • reflective
  • relaxed
  • religious
  • responsive
  • searching
  • self-assertive
  • self-conscious
  • sensible
  • sentimental
  • shy
  • silly
  • smart
  • spontaneous
  • sympathetic
  • tense
  • trustworthy
  • warm
  • wise
  • witty

Motivational equivalent

The concept of meta-emotions categorized by basic emotions offers the possibility of a meta-emotional window as a motivational counterpart to the meta-cognitive Johari window.

Therapy

One therapeutic target may be the expansion of the Open (Arena) square at the expense of both the Unknown square and the Blind Spot square, resulting in greater knowledge of oneself, while voluntary disclosure of Private (Hidden or Facade) squares may result in greater interpersonal intimacy and friendship.[7]

See also

  • According to the johari window what quadrant of the self is known both to others and to the self
    Psychology portal

  • Assertiveness – Capacity of being self-assured without being aggressive to defend a point of view
  • Shadow – Term in Jungian psychology
  • There are known knowns – A phrase, where its opposite, unknown unknowns, was created with the Johari window

References

  1. ^ Luft, J.; Ingham, H. (1955). "The Johari window, a graphic model of interpersonal awareness". Proceedings of the Western Training Laboratory in Group Development. Los Angeles: University of California, Los Angeles.
  2. ^ Pearl, Judea (1983). Heuristics: Intelligent Search Strategies for Computer Problem Solving. New York, Addison-Wesley, p. vii. ISBN 978-0-201-05594-8
  3. ^ Emiliano, Ippoliti (2015). Heuristic Reasoning: Studies in Applied Philosophy, Epistemology and Rational Ethics. Switzerland: Springer International Publishing. pp. 1–2. ISBN 978-3-319-09159-4.
  4. ^ Luft, Joseph (1969). Of Human Interaction. Palo Alto, California: National Press. p. 177.
  5. ^ "Linked-in link to the creation of Johari's window" https://www.linkedin.com/pulse/johari-window-kamal-parmar
  6. ^ Staff (2006). "Johari Window". kevan.org. Retrieved 24 November 2014.
  7. ^ Perry, P. (2010) Couch Fiction. pp. 123–124.

Further reading

  • Kormanski, Luethel M. Using the Johari Window to Study Characterization - JSTOR. 1988, https://www.jstor.org/stable/40029904.
  • Newstrom, John W., and Stephen A. Rubenfeld (1983). “The Johari Window: A Reconceptualization.” Developments in Business Simulation and Experiential Learning: Proceedings of the Annual ABSEL Conference, https://journals.tdl.org/absel/index.php/absel/article/view/2298.
  • Luft, Joseph (1972). Einfuhrung in die Gruppendynamik. Ernst Klett Verlag.
  • Hase, Steward; Alan Davies; Bob Dick (1999). The Johari Window and the Dark Side of Organisations. Southern Cross University.
  • Handy, Charles (2000). 21 Ideas for Managers. San Francisco: Jossey-Bass. ISBN 0-14-027510-X.
According to the johari window what quadrant of the self is known both to others and to the self

  • Noogenesis article on the Johari Window, Examples of window-altering actions; game theory aspects.
  • Online Johari Window tool, by Kevan Davis
  • Johari Window - downloadable application - Fox Valley Technical College

Retrieved from "https://en.wikipedia.org/w/index.php?title=Johari_window&oldid=1124641007"