Search
10 results
Filter search resultsDemocratic governance and evaluation
This paper, presented by Anders Hanberger at the Sixth EES (European Evaluation Society) Conference in Berlin, Germany (2004) argues that governance, democracy and evaluation impact each in different ways.ResourceEvaluation exchange, special issue on democratic evaluation
This special issue of Evaluation Exchange focuses on democratic evaluation and includes discussions on equity and inclusion of a variety of community-focused programs.ResourceWhat is democratic evaluation?
This article from Robert Picciotto provides an overview of democratic evaluation, particularly with reference to its use in the European Union context.ResourceFishbone diagram (cause and effect diagram)
This short guide describes the process of using a fishbone diagram to help uncover and visualise stakeholder perceptions of the root causes of a problem. It is often used in conjunction with the 'Five Whys' technique.ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceThe Five Whys Technique
This paper from the Asian Development Bank (ADB) outlines the process of using the Five Whys technique as an effective approach to problem solving.ResourceDemocratic evaluation
Various ways of doing evaluation in ways that support democratic decision making, accountability and/or capacity.ApproachFive Whys
The Five Whys is an easy question asking option that examines the cause-and-effect relationships that underly problems.MethodDemocratic evaluation and democracy: exploring the reality
Democratic evaluation brings a way of thinking about evaluation’s role in society and in particular, its role in strengthening social justice.ResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource