Search
18 results
Filter search resultsRQ+ Research Quality Plus. A Holistic Approach to Evaluating Research
This report describes a holistic approach and assessment framework for evaluating 'research' that goes beyond the traditional deliberative means (e.g., peer review) and often used analytics (e.g., bibliometrics).ResourceExcel for evaluation
This website, created by Ann Emery, provides a series of short videos on using Microsoft Excel to analyze data.ResourcePositioning participation on the power spectrum
In the second blog in the 4-part series about participation in evaluation, Irene Guijt and Leslie Groves focus on making power relationships and values in 'participatory' evaluation processes explicit to avoid tokenistic partBlogHandbook on monitoring, evaluating and managing knowledge for policy influence
This handbook from the Center for the Implementation of Public Policies Promoting Equity and Growth (CIPPEC) is designed to support research institutions develop monResourceRegression discontinuity
Regression Discontinuity Design (RDD) is a quasi-experimental evaluation option that measures the impact of an intervention, or treatment, by applying a treatment assignment mechanism based on a continuous eligibility index which is a variaMethodCritical systems heuristics: A systematic review
This paper argues that critical systems heuristics (CSH) has been an influential approach, but one that is underutilised compared with other methods.ResourceCritical systems heuristics: The idea and practice of boundary critique
This chapter provides a detailed introduction to critical systems heuristics and the use of its central tool, boundary critique.ResourceTools for knowledge and learning: A guide for development and humanitarian organisations
This tool kit presents entry points and references to the wide range of tools and methods that have been used to facilitate improved knowledge and learning in the development and humanitarian sectors.ResourceKnowledge management and organizational learning
This article provides an overview of knowledge management and it's role in organisational learning.ResourceQuasi-experimental methods for impact evaluations
This video lecture, given by Dr Jyotsna Puri for the Asian Development Bank (ADB) and the International Initiative for Impact Evaluation (3ie), demonstrates how the use of quasi-experimental methods can circumvent the challenge of creatingResourceCritical system heuristics
An approach used to surface, elaborate, and critically consider the options and implications of boundary judgments, that is, the ways in which people/groups decide what is relevant to what is being evaluated.ApproachEvaluation for equitable development results
This document comprises a range of Evaluation Working Papers (EWP) focused on evaluation for equitable development.ResourceWerner Ulrich's home page
This website provides a variety of resources from Werner Ulrich's work in a range of philosophical and research areas with a particular focus on his own work in critical systems thinking and practice or Critical Systems Heuristics (CSH).ResourceMini-primer of Critical Systems Heuristics
This short summary of Critical Systems Heuristics (CSH) by Werner Ulrich gives an overview of what CSH is and how it can be applied.ResourceQuasi-experimental design and methods
This guide, written by Howard White and Shagun Sabarwal for UNICEF looks at the use of quasi-experimental design and methods in impact evaluation.ResourceUNICEF webinar: Quasi-experimental design and methods
What is the main difference between quasi-experiments and RCTs? How can I measure impact when establishing a control group is not an option?ResourceEthics framework and guidelines: A guide for research funding organizations implementing participatory activities
This framework supports the ethical preparation, implementation, and evaluation of participatory processes in research funding and (applied) research & innovation (R&I).ResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource