Search
8 results
Filter search resultsDFAT design and monitoring and evaluation standards
These updated design, monitoring and evaluation standards from the Australian Government aim to "improve the quality and use of Design and M&E products, and to integrate evaluative thinking into everyday work".ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceEvaluability assessment for impact evaluation
This document provides an overview of the utility of and specific guidance and a tool for implementing an evaluability assessment before an impact evaluation is undertaken.ResourceAustralian Volunteers program monitoring, evaluation and learning framework
This example of a monitoring, evaluation and learning framework sets out the approach to assessing the performance of the Australian Volunteers Program. This resource and the following information was contributed by Jo Hall.ResourcegLOCAL Evaluation Week: Yes, gLOCAL - it is not a typo
This week's guest blog is in support of the gLOCAL Evaluation week - a series of free events taking place around the globe and online between June 3-7 2019.BlogLearning from gLOCAL conversations
The week before last, we were treated to over 300 diverse, live events on evaluation in the annual event that is glocal – a week of locally hosted, globally accessible webinars, presentations and hybrid sessions that is convened by the GlobBlogThe science behind data collection - gLOCAL 2023 webinar recap
This blog shares some of the lessons from the gLOCAL2023 webinar, The science behind data collection: how to choose the best tools and approach to collect data considering the culture, context, and existing partnerships. It outlines five considerations:…BlogSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource