Search
8 results
Filter search resultsTool kit on gender equality results and indicators
This tool kit, written by Juliet Hunt for the Asian Development Bank (ADB) and AusAID, aims to provide development practitioners with the knowledge and tools necessary to ensure gender perspectives are considered when developing internResourceAvaliação para o investimento social privado: Metodologias
Este livro reúne um conjunto de contribuições oriundas do Seminário Internacional Avaliação para o Investimento Social Privado: Metodologias, realizado em julho de 2013 no Rio de Janeiro, pela Fundação Itaú Social, Fundação Roberto MarinhoResourceMy “home-made” evaluation tools to avoid gender (and equity) blindness by Sara Vaca
In this AEA365 'Rad Resource' blog post, Sara Vaca discusses the importance and challenges of introducing a Gender perspective into evaluations - even when this is not included in the evaluation ToRs.ResourceChoosing appropriate evaluation methods tool
This tool contains a series of questions and prompts, the results of which provide an indication of which methods will and will not be appropriate to use.ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceEvaluability assessments and choice of evaluation methods
In this Centre for Development Impact seminar, Richard Longhurst (IDS) and Sarah Mistry (BOND) will highlight the importance of evaluability assessments for development projectsResourceHow to manage gender-responsive evaluation
This handbook, produced by the Independent Evaluation Office for UN Women, is aimed at supporting those who are implementing gender-respoResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource