Search
9 results
Filter search resultsRealist synthesis: an introduction
This guide, written by Ray Pawson, Trisha Greenhalgh, Gill Harvey and Kieran Walshe for the ESRC Research Methods Programme, provides an introduction to using realist synthesiResourceExcel charts: Pie charts
This webpage, written by Jorge Camoes for ExcelCharts, outlines the arguments for and against using pie charts and then provides detailed advice and some dos and don'ts for using them.ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceCanva
Canva is a very simple, free to use, online infographic creation platform. It has a drag and drop interface and a range of templates that you can adapt.Resource2017 International realist conference
We've got our head in realism this week, partly because early-bird registrations for the 2017 International Realist Conference close soon, and partly because we've been shown Chris Lysy's realist cartoon series (commissioned by the RamesesBlogDigital dividends in natural resource management
The report sets out research findings on the "digital dividends" of various types of technology on natural resource management in low and middle-income countries.ResourceInfographics
An infographic (short for 'information graphic') represents data visually so that the information is able to be quickly and easily understood.MethodEvidence-based policy: A realist perspective
This book, written by Ray Pawson, provides a critique of the meta-analytic approach and argues that the realist synthesis is a better way of understanding program theory, therefore enabling properly targeted policies to address the conResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource