Search
10 results
Filter search resultsCommunity of Practice design guide
Written by Darren Cambridge and Vicki Suter for the EDUCAUSE Learning Initiative (ELI), this guide provides practical steps and advice for the creation of Communities of Practice (CoPs).ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceUn-boxing evaluation through developmental and agile approaches
Guest author Nerida Buckley discusses how un-boxing evaluation can benefit from looking at practices from developmental and agile approaches.BlogBeyond the evaluation box – Social innovation with Ingrid Burkett
This blog is the sixth in our series about un-boxing evaluation – the theme of aes19 in Sydney.BlogWhat does it mean to ‘un-box’ evaluation?
This guest blog by Jade Maloney is the first in a series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogUn-boxing evaluation through empowerment: A conversation with David Fetterman
This guest blog is an interview between David Fetterman and Jade Maloney. This blog is the second in a series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogUn-boxing the expert label
This guest blog is the third in our series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogUn-boxing NGO evaluation
This blog is the fourth in our series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogThe EvaluateIT resource kit
This online resource kit simplifies the task of evaluating community-based information technology (IT) projects such as community websites, online interest groups, and internet training programs.ResourceSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource