Search
11 results
Filter search resultsTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceUn-boxing evaluation through developmental and agile approaches
Guest author Nerida Buckley discusses how un-boxing evaluation can benefit from looking at practices from developmental and agile approaches.BlogBeyond the evaluation box – Social innovation with Ingrid Burkett
This blog is the sixth in our series about un-boxing evaluation – the theme of aes19 in Sydney.BlogWeek 35: What is Visionary Evaluation?
Today we start a series on "visionary evaluation" - the theme of the 2014 American Evaluation Association conference in October.BlogWeek 36: Systems thinking
This is #2 in our series on visionary evaluation. This year’s AEA Conference theme is visionary evaluation – systems thinking, equity and sustainability. Which begs the question what is systems thinking?BlogWeek 37: Why is equity so important in evaluation?
This is #3 in our series on visionary evaluation.BlogWhat does it mean to ‘un-box’ evaluation?
This guest blog by Jade Maloney is the first in a series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogUn-boxing evaluation through empowerment: A conversation with David Fetterman
This guest blog is an interview between David Fetterman and Jade Maloney. This blog is the second in a series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogUn-boxing the expert label
This guest blog is the third in our series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogUn-boxing NGO evaluation
This blog is the fourth in our series about un-boxing evaluation – the theme of aes19 in Sydney, Australia.BlogSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource