Search
8 results
Filter search resultsRQ+ Research Quality Plus. A Holistic Approach to Evaluating Research
This report describes a holistic approach and assessment framework for evaluating 'research' that goes beyond the traditional deliberative means (e.g., peer review) and often used analytics (e.g., bibliometrics).ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceAction and reflection: a guide for monitoring and evaluating participatory research
This paper from the International Development Research Centre (IDRC) was designed to support those involved in participatory research and development projects with monitoring and evaluation stratResourceDeveloping a research agenda for impact evaluation
Impact evaluation, like many areas of evaluation, is under-researched. Doing systematic research about evaluation takes considerable resources, and is often constrained by the availability of information about evaluation practice.BlogAssessing the impact of research on policy
The authors of this review analyse various evaluation methods (including ethnographic and quantitative approaches, focus groups, process tracing, and network mapping and analysis) to find out which ones are the most suitable to evaluate theResourceInternet questionnaire
An internet questionnaire allows the collection of data through an electronic set of questions that are posted on the web.MethodMonitoring the composition and evolution of the research networks of the CGIAR research program on roots, tubers and bananas (RTB)
This Brief provides an example of how Social Network Analysis (SNA) can be used, in the context of agricultural research.ResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource