Search
9 results
Filter search resultsDemocratic governance and evaluation
This paper, presented by Anders Hanberger at the Sixth EES (European Evaluation Society) Conference in Berlin, Germany (2004) argues that governance, democracy and evaluation impact each in different ways.ResourceEvaluation exchange, special issue on democratic evaluation
This special issue of Evaluation Exchange focuses on democratic evaluation and includes discussions on equity and inclusion of a variety of community-focused programs.ResourceWhat is democratic evaluation?
This article from Robert Picciotto provides an overview of democratic evaluation, particularly with reference to its use in the European Union context.ResourceIf a picture paints a thousand words: The use of rich pictures in evaluation
In this e-book, Judy Oakden discusses the use of Rich Pictures in evaluation. In particular, she addresses why (and when) you should use rich pictures, and answers some of the common questions around the use of rich pictures.ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceDemocratic evaluation
Various ways of doing evaluation in ways that support democratic decision making, accountability and/or capacity.ApproachSoft systems methodology: a thirty year retrospective
Soft Systems Methodology (SSM) can be used to gain understanding of complex relationship drive situations and their contexts.ResourceDemocratic evaluation and democracy: exploring the reality
Democratic evaluation brings a way of thinking about evaluation’s role in society and in particular, its role in strengthening social justice.ResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource