Jarios | Help

Jarios Help

The Help system is to guide Member Users on how to use Jarios.

1. Profiles


    Last revised on Nov 10th, 2014

1.1. What is your Profile?

Your Profile consists of your identification, location and contact details, education and credentials background, employment and experience history, accomplishments, talents and skills.

You have the ability to create, modify, or change, your profile details.

1.2. Creating or Import your Profile

After you have signed-up and registered as a user or a member, you create your profile either by submitting your details manually, or by importing your profile from other social media applications.


1.3. Proxy Profile

A Proxy Profile (PP) is a profile about a person who has yet to sign-up and registers as a user or member.

A ProxyProfile is created by a registered Member or User, on behalf of another person (Non-Member). The Member who created the ProxyProfile is the owner of the ProxyProfile.

Additionally, a ProxyProfile can also be created by searching other social media sites, and selecting a particular person from the search results list. In this case the system imports the particular person’s profile date from the external social media site, and is the owner of the ProxyProfile inside the Jarios system.
  • Proxy Profile Handover (PPHO): The PPHO is a process whereby the actual person represented by the ProxyProfile, after having signed-up as a Jarios Member, can request for his Profile to be handed over back to him/her from the ProxyProfile creator and current owner.
  • Proxy Profile Handover Rules: The PPHO process requires that the current owner of the ProxyProfile, on receiving a PPHO request, must handover the ProxyProfile, once the PPHO requester has verified his identification to the current ProxyProfile owner. If the identity of the PPHO requester cannot be verified by the ProxyProfile current owner, then there is no obligation for the ProxyProfile owner to handover the ProxyProfile. The PPHO requester (actual person represented by the ProxyProfile) has the right and means to request the System Administrator to intervene, arbitrate, and force the ProxyProfile Handover process to continue, and return the ProxyProfile to its rightful owner.

1.4. Member Account

Each person who accepts the Jarios End User License Agreement and Privacy Policy, and then signs-up and signs-in as a registered EndUser or Member, is given a username (typically your email), and a password, and a Member Account. The Member Account consists of the Profile of the Member, inter-personal commentary contributed to him and by him, inter-personal engagements that the Member has with others.

A Member Account can be terminated or closed by the EndUser or Member, but his profile and associated commentary and engagements with others cannot be deleted from the system. If a Member closes his Member Account, his profile, and commentary and engagement histories, will still be preserved for a period of seven (7) years.

Back to Top

2. Search

2.1. Search Jarios


A Member can utilize the search function to find a person-of-interest (POI) – in order to discover, communicate, monitor, impact, and influence, a person in business, workplace, or personal purpose.

Multiple search options provide filtering ability to narrow or broaden the search criteria, and corresponding search-results. If a Member cannot find a person-of-interest, the Member always has the options to create a ProxyProfile of the person-of-interest.

2.2. Connect (to 3rd party Social-Media sites)

Connect allows you to search other third-party social-media sites to find the person of your interest. A Member can use his own login and access credentials to the other social-media site, to retrieve the profile of a person of interest. If the person of interest’ profile exists in the third-party social media site, Jarios will retrieve the profile and store it in the Jarios system.
Back to Top

3. Jarios Messaging

3.1 Type of Messages

Jarios Messaging (J-Messages) consists of a variety of message types, each for a specific intended application use. The various J-Message types are normal, self-destruct, anonymous, or back-channel. The J-Messages are stored in the Member’s messaging environment in the typical inbox, sent, deleted folders.


3.2. Self-Destruct Messages

Self-Destruct messages are intended for super sensitive messages that cannot be allowed to persist or exist, after the recipient has viewed the message. Typically the Self-Destruct class of message is to assure the safety and security of both parties involved in the message exchange, with no trace or evidence of the message left behind.

The Self-Destruct sender will set a variable timer that will trigger as soon as the recipient starts to view the message. Once the timer countdown has been reached, the message will self-destruct, with no trace, and no copy of the message content or its sender or recipient left behind.

3.3. Anonymous Message

The Anonymous message is used when a user does not wish to be identified or associated to the message that is sent to a recipient.

Anonymous messages are used when a user does not want consequences, retribution, or attribution blame for the content of the message. The downside of anonymity is the loss of credibility when a person does not stand behind his words. The upside of anonymity is the freedom of expression without the consequences.

3.4. Back-Channel Messages

Back-Channel Messages are intended for those message exchanges between parties that need to occur, but which cannot occur officially or legally. The parties identities in the Back-Channel message exchange are either undeclared or cloaked, and the message bodies are maintained in a shared space and visible only by the parties involved. Each party can only delete or remove his own submissions in the Back-Channel message.

Back-Channel messages are typically used in sensitive influence, persuasion, or negotiation initiatives, as a supplement to broader inter-personal dialogues and exchanges between parties.

Back to Top

4. Social Influence Networks

4.1. Overview

The Social influence networks consist of a network of networks that depict a person’s association, engagements, or affiliations with others, in various relationships, dependencies, and impacts. Typically the type of impacts will be in career and opportunity, financial, emotional, rights, and relationships categories. A person typically would have a workplace network, business network, advisory board, and a personal network, of associations with others. The set of networks of a person helps build accountability for a person’s performance and conduct in business, workplace, and personal inter-personal engagements.


4.2. Business Network



The Business Network Structure of a Member is designed to accurately represent a person’s dependencies, relationships, and stakeholders in Business activities. The spectrum of engagement relationships covers customers, suppliers, partners, investors, financiers, shareholders, and authorities. The Member User can traverse the Network from direct to indirect relationships to uncover secondary relationships and stakeholders. Inclusion into a Member’s Business Network is by self-election by another Member who has legitimate claims and dependencies to business interfaces with the Member.

4.3. WorkPlace Network

The WorkPlace Network Structure of a Member is designed to accurately represent a person’s dependencies, relationships, and stakeholders in the WorkPlace. The spectrum of engagement relationships covers managers, leadership, peers, subordinates, authorities, and company-workplace shareholder. The Member User can traverse the Network from direct to indirect relationships to uncover secondary relationships and stakeholders. Inclusion into a Member’s WorkPlace Network is by self-election by another Member who has legitimate claims and dependencies to the workplace.

4.4. Personal Network

The Personal Network Structure of a Member is designed to accurately represent a person’s dependencies, relationships, and stakeholders in his/her personal life. The spectrum of engagement relationships covers family members, friends, and relatives. Inclusion in the Member’s Personal Network is qualified and controlled by the Personal Network members themselves.


4.5. Personal Advisory Board (PAB)

The Personal Advisory Board Network Structure is a private network of a persons’ associations with trusted others. The spectrum of relationships covers mentors, advisors, coaches etc. Inclusion and participation in the PAB is by invitation only. However Member Users out-of-network can access those in this network in their own individual capacity.

Back to Top

5. Commentary

5.1. Post Commentary

A Member User has the ability to post commentary about a person-of-interest (POI), with respect to his direct inter-personal engagement and experiences with the POI either in business, workplace, or personal scenarios. The commentaries are public to other Members, and are used to form blended characterization about the person-of-interest.

5.2. Delete Commentary

A Member User has the ability to delete any commentary that he has posted about a person-of-interest.

5.3. Retract Commentary

A Member User has the ability to retract any commentary that he has posted about a person-of-interest. Commentary retraction is about formally taking back the commentary (possibly infringing) and optionally posting a replacement commentary in place.

5.4. Dispute Commentary

A Member User has the ability to dispute any commentary that has been posted about the Member User by other Members.

5.5. Report Abuse of Commentary

A Member User has the ability to report abuse of any commentary that has been posted about the Member User by other Members. Jarios customer support will follow-up and arbitrate the issue, and will have full and final authority over the abuse issue and settlement..

Back to Top

6. Judgments

6.1. What is a Judgment?

Judgments are system generated guidance about a specific person, based on the commentaries and sentiments posted by Member Users about the specific person-of-interest. The judgments are public and available to any Member. The judgments aggregate into a collective assessment called a Character Genome of a person.

6.2. Categories of Judgment

The judgments span several categories regarding the person of interest - character, behavior-conduct, leadership, style, position and status, criminal, appearance, strengths and weaknesses that are relevant in business, workplace, and personal situations. Each judgment category has its own individual judgment scores and advisory to help Members make relative calibration of the person and the associated characterizations. This helps in people discovery and understanding, managing people risks, and optimizing the choices and chances of person selection, with respect to your specific inter-personal engagement or initiative.

Back to Top

7. Inter-Personal Engagements

7.1. What is an Inter-Personal Engagement?

The goal of the inter-personal engagement is to secure and assure the best inter-personal experiences, responses, actions, from and with others, for you – for engagements of consequence in business, workplace, and personal situations.

The inter-personal engagement is the situation where two (2) or more parties combine to achieve or accomplish a purpose jointly over the lifecycle of the engagement. An interpersonal engagement consists of a sequence of interacting events that transpire between two (2) or more involved parties.

Your use various tools to help influence, persuade, and negotiate others to do what you want them to do.

The inter-personal engagement structure brings the following advantages and benefits:
  • helps participants fully understand the consequences of their actions, performance, conduct;
  • ensures transparency, and accountability;
  • recruits all direct and in-direct stakeholder and decision-maker participation;
  • crosses all organizational, people, and statutory boundaries, and access and visibility barriers;
  • surfaces shadow and unscrupulous activity;
  • levels the playing field imbalances in power, status, allegiances, biases, financial stamina, vested agendas, relationships leverage, legal strengths, character weaknesses, deficits in inter-personal and technical skills, inadequacies in law and law-enforcement,
  • overcomes asymmetry of information, actions, and conduct over time;
  • builds mutual purpose and mutual safety, aligns self-interests, manages divergent interests

7.2. Inter-Personal Engagement Participants and Roles

The Inter-Personal Engagement can be initiated by any Member. Participants are classified by their respective roles (participant, observer), which enables or restricts rights and abilities in the Inter-Personal Engagement. Participants are enabled to create, modify, and delete events, as well as invite other participants and observers. Observers are allowed to monitor the engagement and associated events.

7.3. Events

Events capture the occurrences, actions, transactions, exchanges, and incidences between the involved parties, throughout the duration of the lifecycle engagement. Events are of various event types – message, ask, redflag, consequence, verifiables-observables-measurables etc, that participants create, and are conducted in chronological order over a timeline. An interface line separates the participants in the inter-personal engagement.

  • Message Event: to help exchange information relevant to the specific inter-personal engagement. Ask Event: this helps a person know precisely what behavior, actions, and deliverables are required from another.
  • RedFlag Event: this help identify and qualify the RedFlags in intent, actions, behavior and conduct, performance, process, and substance..
  • Consequence Event: this helps make invisible consequences visible so that all vested parties have visibility into natural, intended and un-intended consequences, as well as capturing and calibrating the impacts imposed on self and others.
  • Verifiable-Observable-Measurable Event: this captures from the lens of a participant, the verifiable, observable, and measurable facts, truths, and evidences, as opposed to the interpretations of the facts via the filters of bias, self-interests, allegiances, and beliefs.

7.4. Creating & Modify Events

A Member can create and modify events on only the Member’s side of interface line, to track the events that influences, or impacts the Member, as well as the events the Member initiates and responses.

7.5. Sharing Events

A Member can share the events that the Member has created to any participant in the inter-personal engagement.

Back to Top