SlideShare une entreprise Scribd logo
1  sur  16
Presentation
on
Johari Window
Presented by:Presented to:Ms. Ravneet Kaur Tung
Faculty PCTE

Anamika Trehan
Anu Khurana
Ankur Bhalla
Johari Window
• The Johari Window model is a simple and useful tool for
illustrating and improving self-awareness, and mutual
understanding between individuals within a group.
• The Johari Window model can also be used to assess and
improve a group's relationship with other groups.
Founders
• The Johari Window model was devised by American
psychologists Joseph Luft and Harry Ingham in 1955, while
researching group dynamics at the University of California
Los Angeles.
• The model was first published in the Proceedings of the
Western Training Laboratory in Group Development by UCLA
Extension Office in 1955, and was later expanded by Joseph
Luft.
Formation of Name
• Luft and Ingham called their Johari Window model 'Johari'
after combining their first names, Joe and Harry. In early
publications the word appears as 'JoHari'.
Influence
Today the Johari Window model is especially relevant due to
modern emphasis on, and influence of
• 'soft' skills
• behaviour
• empathy
• cooperation
• inter-group development
• interpersonal development.
Use of Johari Model
• The Johari Window soon became a widely used model for
understanding and training self-awareness, personal
development, improving communications, interpersonal
relationships, group dynamics, team development and intergroup relationships.
What actually Model Represents
• The Johari Window model is also referred to as a
'disclosure/feedback model of self awareness', and by some
people an 'information processing tool'.
• The Johari Window actually represents information - feelings,
experience, views, attitudes, skills, intentions, motivation, etc within or about a person - in relation to their group, from four
perspectives.
Areas of Model
• The four Johari Window perspectives are called 'regions' or
'areas' or 'quadrants'. Each of these regions contains and
represents the information - feelings, motivation, etc – known
about the person, in terms of whether the information is known
or unknown by the person, and whether the information is
known or unknown by others in the group.
Johari window four regions
1. what is known by the person about him/herself and is also
known by others - open area, open self, free area, free self, or 'the
arena‘.
2. what is unknown by the person about him/herself but which
others know - blind area, blind self, or 'blindspot‘.
3. what the person knows about him/herself that others do not
know - hidden area, hidden self, avoided area, avoided self or
'facade‘.
4. what is unknown by the person about him/herself and is also
unknown by others - unknown area or unknown self.
Johari quadrant 1
• Johari region 1 is also known as the 'area of free activity'. This
is the information about the person - behaviour, attitude,
feelings, emotion, knowledge, experience, skills, views, etc known by the person ('the self') and known by the group
('others').
• The aim in any group should always be to develop the 'open
area' for every person, because when we work in this area with
others we are at our most effective and productive, and the
group is at its most productive too. The open free area, or 'the
arena', can be seen as the space where good communications
and cooperation occur, free from distractions, mistrust,
confusion, conflict and misunderstanding.
Johari quadrant 2
• Johari region 2 is what is known about a person by others in
the group, but is unknown by the person him/herself.
• This blind area is not an effective or productive space for
individuals or groups. This blind area could also be referred to
as ignorance about oneself, or issues in which one is deluded.
A blind area could also include issues that others are
deliberately with holding from a person. We all know how
difficult it is to work well when kept in the dark. No-one
works well when subject to 'mushroom management'. People
who are 'thick-skinned' tend to have a large 'blind area'.
Johari region 3
• what is known to ourselves but kept hidden from, and therefore
unknown, to others.
• This hidden or avoided self represents information, feelings, etc,
anything that a person knows about him/self, but which is not
revealed or is kept hidden from others. The hidden area could also
include sensitivities, fears, hidden agendas, manipulative intentions,
secrets - anything that a person knows but does not reveal, for
whatever reason. It's natural for very personal and private
information and feelings to remain hidden, indeed, certain
information, feelings and experiences have no bearing on work, and
so can and should remain hidden. However, typically, a lot of hidden
information is not very personal, it is work- or performance-related,
and so is better positioned in the open area.
Johari region 4
• It contains information, feelings, talent abilities, aptitudes,
experiences etc, that are unknown to the person him/herself
and unknown to others in the group.
• These unknown issues take a variety of forms: they can be
feelings, behaviours, attitudes, capabilities, aptitudes, which
can be quite close to the surface, and which can be positive
and useful, or they can be deeper aspects of a person's
personality, influencing his/her behaviour to various degrees.
Large unknown areas would typically be expected in younger
people, and people who lack experience or self-belief.
Unknown factors
• an ability that is under-estimated or un-tried through lack of
opportunity, encouragement, confidence or training.
• a natural ability or aptitude that a person doesn't realise they
possess
• a fear or aversion that a person does not know they have
• an unknown illness
• repressed or subconscious feelings
• conditioned behaviour or attitudes from childhood
Thank You......
Now the
House is open for Queries

Contenu connexe

Tendances

scope and function of MENTAL HEALTH NURSING.pdf
scope and function of MENTAL HEALTH NURSING.pdfscope and function of MENTAL HEALTH NURSING.pdf
scope and function of MENTAL HEALTH NURSING.pdfJkbros1
 
Therapeutic impasses ppt
Therapeutic impasses pptTherapeutic impasses ppt
Therapeutic impasses pptPooja Saharan
 
Standard of psychiatry nursing
Standard of psychiatry nursingStandard of psychiatry nursing
Standard of psychiatry nursingSuresh Aadi Sharma
 
BLINDNESS CONTROL PROGRAMME-INDIA
BLINDNESS CONTROL PROGRAMME-INDIABLINDNESS CONTROL PROGRAMME-INDIA
BLINDNESS CONTROL PROGRAMME-INDIAMAHESWARI JAIKUMAR
 
Principles of mental health nursing
Principles of mental health nursingPrinciples of mental health nursing
Principles of mental health nursingjasleenbrar03
 
National Mental Health Policy
National Mental Health PolicyNational Mental Health Policy
National Mental Health PolicyRuppaMercy
 
Human rights for mentally ill persons
Human rights for mentally ill personsHuman rights for mentally ill persons
Human rights for mentally ill personsNithiy Uday
 
Family therapy and family counseling
Family therapy and family counseling Family therapy and family counseling
Family therapy and family counseling mamtabisht10
 
Concept of normal and abnormal behaviour 1
Concept of normal and abnormal behaviour 1Concept of normal and abnormal behaviour 1
Concept of normal and abnormal behaviour 1amitsunrise
 
NATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTH
NATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTHNATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTH
NATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTHMahaveer Swarnkar
 
Mental health act
Mental health actMental health act
Mental health actgusainrahul
 
Johari window gadha
Johari window gadhaJohari window gadha
Johari window gadhaJithin Zcs
 
Nursing research statement
Nursing research statementNursing research statement
Nursing research statementNursing Path
 
Johari window, HUMAN RELATION
Johari window, HUMAN RELATIONJohari window, HUMAN RELATION
Johari window, HUMAN RELATIONKrupa Mathew
 

Tendances (20)

scope and function of MENTAL HEALTH NURSING.pdf
scope and function of MENTAL HEALTH NURSING.pdfscope and function of MENTAL HEALTH NURSING.pdf
scope and function of MENTAL HEALTH NURSING.pdf
 
Therapeutic impasses ppt
Therapeutic impasses pptTherapeutic impasses ppt
Therapeutic impasses ppt
 
Standard of psychiatry nursing
Standard of psychiatry nursingStandard of psychiatry nursing
Standard of psychiatry nursing
 
Mental health act 1987
Mental health act 1987Mental health act 1987
Mental health act 1987
 
BLINDNESS CONTROL PROGRAMME-INDIA
BLINDNESS CONTROL PROGRAMME-INDIABLINDNESS CONTROL PROGRAMME-INDIA
BLINDNESS CONTROL PROGRAMME-INDIA
 
Principles of mental health nursing
Principles of mental health nursingPrinciples of mental health nursing
Principles of mental health nursing
 
National Mental Health Policy
National Mental Health PolicyNational Mental Health Policy
National Mental Health Policy
 
Group therapy
Group therapyGroup therapy
Group therapy
 
Human rights for mentally ill persons
Human rights for mentally ill personsHuman rights for mentally ill persons
Human rights for mentally ill persons
 
Family therapy and family counseling
Family therapy and family counseling Family therapy and family counseling
Family therapy and family counseling
 
Concept of normal and abnormal behaviour 1
Concept of normal and abnormal behaviour 1Concept of normal and abnormal behaviour 1
Concept of normal and abnormal behaviour 1
 
Crisis intervention
Crisis interventionCrisis intervention
Crisis intervention
 
NATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTH
NATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTHNATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTH
NATIONAL AND INTERNATIONAL ORGANIZATION RELATED TO CHILD HEALTH
 
Milieu therapy
Milieu therapyMilieu therapy
Milieu therapy
 
Mental health act
Mental health actMental health act
Mental health act
 
Lithium toxicity
Lithium toxicityLithium toxicity
Lithium toxicity
 
Johari window gadha
Johari window gadhaJohari window gadha
Johari window gadha
 
Paranoid schizophrenia
Paranoid schizophreniaParanoid schizophrenia
Paranoid schizophrenia
 
Nursing research statement
Nursing research statementNursing research statement
Nursing research statement
 
Johari window, HUMAN RELATION
Johari window, HUMAN RELATIONJohari window, HUMAN RELATION
Johari window, HUMAN RELATION
 

En vedette

Data preprocessing
Data preprocessingData preprocessing
Data preprocessingvenkadesh236
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessingHoang Nguyen
 
Overview of DATA PREPROCESS..
Overview of DATA PREPROCESS..Overview of DATA PREPROCESS..
Overview of DATA PREPROCESS..killerkarthic
 
data warehousing & minining 1st unit
data warehousing & minining 1st unitdata warehousing & minining 1st unit
data warehousing & minining 1st unitbhagathk
 
Data preprocessing ppt1
Data preprocessing ppt1Data preprocessing ppt1
Data preprocessing ppt1meenas06
 
Python for Image Understanding: Deep Learning with Convolutional Neural Nets
Python for Image Understanding: Deep Learning with Convolutional Neural NetsPython for Image Understanding: Deep Learning with Convolutional Neural Nets
Python for Image Understanding: Deep Learning with Convolutional Neural NetsRoelof Pieters
 

En vedette (7)

Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Overview of DATA PREPROCESS..
Overview of DATA PREPROCESS..Overview of DATA PREPROCESS..
Overview of DATA PREPROCESS..
 
Preprocess
PreprocessPreprocess
Preprocess
 
data warehousing & minining 1st unit
data warehousing & minining 1st unitdata warehousing & minining 1st unit
data warehousing & minining 1st unit
 
Data preprocessing ppt1
Data preprocessing ppt1Data preprocessing ppt1
Data preprocessing ppt1
 
Python for Image Understanding: Deep Learning with Convolutional Neural Nets
Python for Image Understanding: Deep Learning with Convolutional Neural NetsPython for Image Understanding: Deep Learning with Convolutional Neural Nets
Python for Image Understanding: Deep Learning with Convolutional Neural Nets
 

Similaire à Johari window

Johari window PPT by mukul.pptx
Johari window PPT by mukul.pptxJohari window PPT by mukul.pptx
Johari window PPT by mukul.pptxMUKUL TYAGI
 
Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020
Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020
Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020PriyankaBhattacharya28
 
johariwindow-140115093459-phpapp02.pptx
johariwindow-140115093459-phpapp02.pptxjohariwindow-140115093459-phpapp02.pptx
johariwindow-140115093459-phpapp02.pptxKIPAIZAGABAWA1
 
The johari-window final
The johari-window finalThe johari-window final
The johari-window finalAbhisek Gupta
 
Managerial Communication Theories
Managerial Communication TheoriesManagerial Communication Theories
Managerial Communication TheoriesSandeep Kodebathula
 
Bs 101 module 2 - self awareness
Bs 101   module 2 - self awarenessBs 101   module 2 - self awareness
Bs 101 module 2 - self awarenessTamojit Das
 
Johari window model
Johari window modelJohari window model
Johari window modelVidhu Arora
 
Johari windowexplain
Johari windowexplainJohari windowexplain
Johari windowexplainmukul249
 
Johari-Window - Copy.pptx
Johari-Window - Copy.pptxJohari-Window - Copy.pptx
Johari-Window - Copy.pptxWillGold7
 

Similaire à Johari window (20)

Johari window PPT by mukul.pptx
Johari window PPT by mukul.pptxJohari window PPT by mukul.pptx
Johari window PPT by mukul.pptx
 
17841186.ppt
17841186.ppt17841186.ppt
17841186.ppt
 
Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020
Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020
Johari Window_KSMS_BBA_2nd Sem_Prantik Debnath_20th March 2020
 
Final ppt
Final pptFinal ppt
Final ppt
 
Johari window
Johari windowJohari window
Johari window
 
johariwindow-140115093459-phpapp02.pptx
johariwindow-140115093459-phpapp02.pptxjohariwindow-140115093459-phpapp02.pptx
johariwindow-140115093459-phpapp02.pptx
 
The johari-window final
The johari-window finalThe johari-window final
The johari-window final
 
Johari window
Johari windowJohari window
Johari window
 
Johari window ppt new
Johari window ppt newJohari window ppt new
Johari window ppt new
 
Johari window
Johari windowJohari window
Johari window
 
Johari window
Johari windowJohari window
Johari window
 
Johariswindow
JohariswindowJohariswindow
Johariswindow
 
Johari window
Johari windowJohari window
Johari window
 
Managerial Communication Theories
Managerial Communication TheoriesManagerial Communication Theories
Managerial Communication Theories
 
Bs 101 module 2 - self awareness
Bs 101   module 2 - self awarenessBs 101   module 2 - self awareness
Bs 101 module 2 - self awareness
 
Johari's window
Johari's windowJohari's window
Johari's window
 
Johari window model
Johari window modelJohari window model
Johari window model
 
Johari windowexplain
Johari windowexplainJohari windowexplain
Johari windowexplain
 
Johari
JohariJohari
Johari
 
Johari-Window - Copy.pptx
Johari-Window - Copy.pptxJohari-Window - Copy.pptx
Johari-Window - Copy.pptx
 

Plus de priya_trehan

Plus de priya_trehan (14)

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Wordpress
WordpressWordpress
Wordpress
 
Types of E commerce & Payment Models
Types of E commerce & Payment ModelsTypes of E commerce & Payment Models
Types of E commerce & Payment Models
 
Friction as a necessary evil
Friction as a necessary evilFriction as a necessary evil
Friction as a necessary evil
 
Introduction to trees
 Introduction to trees Introduction to trees
Introduction to trees
 
File handling
File handlingFile handling
File handling
 
Datapreprocessing
DatapreprocessingDatapreprocessing
Datapreprocessing
 
Input output
Input outputInput output
Input output
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
 
Packages
PackagesPackages
Packages
 
Protocols
ProtocolsProtocols
Protocols
 
Kiosk
KioskKiosk
Kiosk
 
Photoshop
PhotoshopPhotoshop
Photoshop
 
Art of listening
Art of listeningArt of listening
Art of listening
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Johari window

  • 1. Presentation on Johari Window Presented by:Presented to:Ms. Ravneet Kaur Tung Faculty PCTE Anamika Trehan Anu Khurana Ankur Bhalla
  • 2. Johari Window • The Johari Window model is a simple and useful tool for illustrating and improving self-awareness, and mutual understanding between individuals within a group. • The Johari Window model can also be used to assess and improve a group's relationship with other groups.
  • 3. Founders • The Johari Window model was devised by American psychologists Joseph Luft and Harry Ingham in 1955, while researching group dynamics at the University of California Los Angeles. • The model was first published in the Proceedings of the Western Training Laboratory in Group Development by UCLA Extension Office in 1955, and was later expanded by Joseph Luft.
  • 4. Formation of Name • Luft and Ingham called their Johari Window model 'Johari' after combining their first names, Joe and Harry. In early publications the word appears as 'JoHari'.
  • 5. Influence Today the Johari Window model is especially relevant due to modern emphasis on, and influence of • 'soft' skills • behaviour • empathy • cooperation • inter-group development • interpersonal development.
  • 6. Use of Johari Model • The Johari Window soon became a widely used model for understanding and training self-awareness, personal development, improving communications, interpersonal relationships, group dynamics, team development and intergroup relationships.
  • 7. What actually Model Represents • The Johari Window model is also referred to as a 'disclosure/feedback model of self awareness', and by some people an 'information processing tool'. • The Johari Window actually represents information - feelings, experience, views, attitudes, skills, intentions, motivation, etc within or about a person - in relation to their group, from four perspectives.
  • 8. Areas of Model • The four Johari Window perspectives are called 'regions' or 'areas' or 'quadrants'. Each of these regions contains and represents the information - feelings, motivation, etc – known about the person, in terms of whether the information is known or unknown by the person, and whether the information is known or unknown by others in the group.
  • 9. Johari window four regions 1. what is known by the person about him/herself and is also known by others - open area, open self, free area, free self, or 'the arena‘. 2. what is unknown by the person about him/herself but which others know - blind area, blind self, or 'blindspot‘. 3. what the person knows about him/herself that others do not know - hidden area, hidden self, avoided area, avoided self or 'facade‘. 4. what is unknown by the person about him/herself and is also unknown by others - unknown area or unknown self.
  • 10.
  • 11. Johari quadrant 1 • Johari region 1 is also known as the 'area of free activity'. This is the information about the person - behaviour, attitude, feelings, emotion, knowledge, experience, skills, views, etc known by the person ('the self') and known by the group ('others'). • The aim in any group should always be to develop the 'open area' for every person, because when we work in this area with others we are at our most effective and productive, and the group is at its most productive too. The open free area, or 'the arena', can be seen as the space where good communications and cooperation occur, free from distractions, mistrust, confusion, conflict and misunderstanding.
  • 12. Johari quadrant 2 • Johari region 2 is what is known about a person by others in the group, but is unknown by the person him/herself. • This blind area is not an effective or productive space for individuals or groups. This blind area could also be referred to as ignorance about oneself, or issues in which one is deluded. A blind area could also include issues that others are deliberately with holding from a person. We all know how difficult it is to work well when kept in the dark. No-one works well when subject to 'mushroom management'. People who are 'thick-skinned' tend to have a large 'blind area'.
  • 13. Johari region 3 • what is known to ourselves but kept hidden from, and therefore unknown, to others. • This hidden or avoided self represents information, feelings, etc, anything that a person knows about him/self, but which is not revealed or is kept hidden from others. The hidden area could also include sensitivities, fears, hidden agendas, manipulative intentions, secrets - anything that a person knows but does not reveal, for whatever reason. It's natural for very personal and private information and feelings to remain hidden, indeed, certain information, feelings and experiences have no bearing on work, and so can and should remain hidden. However, typically, a lot of hidden information is not very personal, it is work- or performance-related, and so is better positioned in the open area.
  • 14. Johari region 4 • It contains information, feelings, talent abilities, aptitudes, experiences etc, that are unknown to the person him/herself and unknown to others in the group. • These unknown issues take a variety of forms: they can be feelings, behaviours, attitudes, capabilities, aptitudes, which can be quite close to the surface, and which can be positive and useful, or they can be deeper aspects of a person's personality, influencing his/her behaviour to various degrees. Large unknown areas would typically be expected in younger people, and people who lack experience or self-belief.
  • 15. Unknown factors • an ability that is under-estimated or un-tried through lack of opportunity, encouragement, confidence or training. • a natural ability or aptitude that a person doesn't realise they possess • a fear or aversion that a person does not know they have • an unknown illness • repressed or subconscious feelings • conditioned behaviour or attitudes from childhood
  • 16. Thank You...... Now the House is open for Queries