Search

  • Excel charts: Pie charts

    This webpage, written by Jorge Camoes for ExcelCharts, outlines the arguments for and against using pie charts and then provides detailed advice and some dos and don'ts for using them.
    Resource
  • Technology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator

    This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.
    Resource
  • Canva

    Canva is a very simple, free to use, online infographic creation platform. It has a drag and drop interface and a range of templates that you can adapt.
    Resource
  • A quick primer on running online events and meetings

    Meetings and gatherings are vital components of evaluation. Often these are done face-to-face, however sometimes necessity or practicality makes meeting online the best option.
    Blog
  • Digital dividends in natural resource management

    The report sets out research findings on the "digital dividends" of various types of technology on natural resource management in low and middle-income countries.
    Resource
  • Infographics

    An infographic (short for 'information graphic') represents data visually so that the information is able to be quickly and easily understood.
    Method
  • Formal meeting processes

    Studies have demonstrated that attendance at meetings and conferences, planning discussions within the project related to use of the program evaluation, and participation in data collection foster feelings of evaluation involvement among st
    Method
  • Conducting effective meetings

    This paper from the Asian Development Bank (ADB) provides a number of strategies to ensure that meetings reach stated objectives in an engaging and productive manner.
    Resource
  • SAVE Toolkit: Technologies for monitoring in insecure environments

    In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatio
    Resource