Search
9 results
Filter search resultsExcel charts: Pie charts
This webpage, written by Jorge Camoes for ExcelCharts, outlines the arguments for and against using pie charts and then provides detailed advice and some dos and don'ts for using them.ResourceEmbedding evaluation in national plans and policies to foster transformative development
This IIED Briefing Paper argues that meaningful evaluation of progress towards achieving sustainable development extends beyond supporting voluntary national reviews, and that for the full potential of evaluation to be realised, evaluationResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceCanva
Canva is a very simple, free to use, online infographic creation platform. It has a drag and drop interface and a range of templates that you can adapt.ResourceDigital dividends in natural resource management
The report sets out research findings on the "digital dividends" of various types of technology on natural resource management in low and middle-income countries.ResourceEvaluating capacity development: A case from agricultural research
The paper presents a conceptual framework developed to evaluate capacity development efforts, combining qualitative and quantitative methods.ResourceBuilding an evaluative culture for effective evaluation and results management
This brief from the Institutional Learning and Change Initiative (ILAC) provides advice on building an evaluative culture allowing organisations to better manage and provide programs and services.ResourceInfographics
An infographic (short for 'information graphic') represents data visually so that the information is able to be quickly and easily understood.MethodSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource