Search
9 results
Filter search resultsTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.RecursoLearning from exemplars of evaluation
Are there particular examples of evaluations that you return to think about often?BlogInstitutional history
An institutional history (IH) is a narrative that records key points about how institutional arrangements – new ways of working – have evolved over time and have created and contributed to more effective ways to achieve project or programmeMétodoEngaging scientists through institutional histories
This brief from the Institutional Learning and Change Initiative (ILAC), describes the reasoning and methods for producing Institutional Histories (IH).RecursoBuilding an evaluative culture for effective evaluation and results management
This brief from the Institutional Learning and Change Initiative (ILAC) provides advice on building an evaluative culture allowing organisations to better manage and provide programs and services.RecursoUsing the context, input, process, and product evaluation model (CIPP) as a comprehensive framework
This Journal article, in the context of education, provides an overview of what the CIPP model is, in which circumstances it is useful, and finally provides a practical example of how the model was used.RecursoCIPP evaluation model checklist
Stufflebeam provides an explanation of what CIPP is, and a checklist designed to help evaluators evaluate programs with relatively long-term goals.RecursoO sistema de monitoramento e avaliação dos programas de promoção e proteção social do Brasil
Apresentação do sistema brasileiro de monitoramento e avaliação de programas sociais, como parte da cooperação Brasil-Africa .RecursoSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioRecurso