Monitoring and Evaluation with Stabilisation

In: Business and Management

Submitted By Srinand1
Words 2423
Pages 10
Monitoring and Evaluation within Stabilisation Environments
Registration Numbers: Mariya Ilieva Spyridon Bonikos Nikolaos Manolitsis Smaro Kelesidou Ed Ostler Viswanathan Subramaniam Julian Schwarzkopf Ciro Fisicaro Alozie Glory Uche 201489866 201490054 201453124 201455352 201488881 201476168 201463502 201459312 201474863

Abbreviations: ICRG - International Country Risk Guide MPICE - Measuring Progress in Conflict Environments CA - Contribution Analysis CSME - Conflict Sensitivity Monitoring and Evaluation

Executive Summary There are many different monitoring and evaluation techniques used by the industry that could be adapted to post conflict zones. They all have different strength and weaknesses that need to be weigh up carefully to fit the technique to the situation. The techniques investigated are: · International Country Risk Guide (ICRG) uses different variables to measure a country’s creditworthiness and estimate its ability and willingness to comply with its financial obligations. · Contribution Analysis (CA) is a logic model that evaluates the degree of contribution that the intervention is making to the observed measures. · Measuring Progress in Conflict Environments (MPICE) measures the effectiveness of diplomatic, military, and development efforts · Conflict Sensitivity Monitoring and Evaluation provides a detailed understanding of the conflicts context. Some of these techniques are more theoretical than others and can be applied in different speed and with different understanding of the conflict zone.

Contents
1. Monitoring and Evaluation Techniques .............................................................................................. 1 1.1 International Country Risk Guide (ICRG) ....................................................................................... 1 1.2 Contribution Analysis (CA)…...

Similar Documents

Governance and Management Schemes Towards Readiness of Public and Private Higher Educational Institutions to Institutional Quality Assurance Through Monitoring and Evaluation

...ABSTRACT Title : Governance and Management Schemes towards Readiness of Public and Private Higher Educational Institutions to Institutional Quality Assurance through Monitoring and Evaluation Researcher : Helen P. Aquines Degree : Doctor in Public Administration Institution : Polytechnic University of the Philippines Year : 2011 Adviser : Dr. Adela Jamorabo-Ruiz The Problem The main objective of the study is to analyze the readiness of Polytechnic University of the Philippines (PUP) and Maritime Academy of the Philippines (MAAP) to Institutional Quality Assurance through Monitoring and Evaluation (IQuAME) by CHED and to propose some governance and management schemes. Specifically, this study sought answers to the following questions: 1. What are the profiles of PUP and MAAP in terms of: 1.1 Vision, 1.2 Mission, and 1.3 Philosophy/Goals? 2. How prepared are the two (2) Higher Educational Institutions on the IQuAME program of CHED in the following areas: 2.1 Governance 2.2 Quality of Teaching and Research 2.3 Support for Students 2.4 Relations with the Community 2.5 Management of Resources 3. What are the problems encountered in the implementation of the performance measures of IQuAME? 4. What are the governance and management schemes that may be adopted to assist the school administrators to the field of public administration? Research Methodology The study utilized the descriptive method......

Words: 5074 - Pages: 21

Evaluation

...Evaluation (& Continuation) Phase • Criminal Restitution (clean-up): $100 million; eventually $2.2-3.2 billion • Criminal Plea Agreement: $150 million fine (largest ever for environmental crime) (later reduced to $25 million w/ half for North Am Wetlands Conservation Fund & half to Victims of Crime Fund; $300 million in lost wages for fishermen • Civil Settlement: $900 million over 10 years to restore environmental resources • Punitive Damages: $5.3 billion (largest punitive fines ever for corporate irresponsibility); vacated & reinstated; Dec 2006 reduced to $2.5 billion (now $4.5 billion w/ interest); Exxon still appealing (Jan 2007) • Reputational Outcome: Exxon lost market share, stock dropped $3 billion; slipped from largest to third-largest oil company; target of consumer boycott. "Exxon Valdez" synonymous w/ corporate arrogance & shirking responsibility (2004). Called "most anti-environmental company in the world." Alaska Bishop: Exxon threatens "the web of life." Greenpeace: "Classic case of deny, dupe & delay." (2006) Britain science academy: Stop funding groups that misrepresent climate science. Canada: Exxon-Mobil spending millions to discredit science that fossil fuels accelerates global warming. • Corporate Outcome: Merger w/ Mobil Oil; $36 billion profits in 2005 (largest ever for any US company) • Legal Spin-off: In 2000, Alabama jury assessed Exxon $2.5 billion for defrauding state on gas royalties;......

Words: 380 - Pages: 2

Monitoring System

...your love ones stay at the respective places of these life plans is expensive. The funeral home often sets aside one or more large areas for people to gather at a visitation. This area may contain a space to display the body in a casket to visitors who may pay their respects. Funeral and memorial services may also take place at the funeral home. 1.2 Statement of the Problem Nova Funeral has lack of information of computer capabilities and performances although they have a computer but still using typewriter and manually written for Death Certificate and Contracts. 1.3 Objectives of the Study Create and develop a better System that they always do to make their work faster and reliable. Implement general and appropriate Monitoring System. 1.4 Significance of the Study This study aims to create a system wherein we can apply the current knowledge we have in the field of computer programming. It is necessary since we have to develop our skills in an actual programming scenario. And as Information Technology students, we hope to learn more and broaden our ideas in creating a system that needs a wider understanding and analysis of instructions’ flow. 1.5 Scope and Limitations It covers about the use of a simple database for storing and securing information from the company’s clients which indeed is lacking in security and organizing of records. However, since this is only simple database system, there are of course, limitations. These include......

Words: 3357 - Pages: 14

Sample Monitoring & Evaluation Plan

...Sample Monitoring & Evaluation Plan Prepared by: Stephanie Ly, MPH Goal: Create a rigorous monitoring and evaluation plan to assess the effectiveness of a non-profit program addressing violence against women in Central America. Objective 1: Develop a method to collect quantifiable outputs from educational programs by May 2013. * Activity 1.1: Collect data on professional attendees such as police officers and first responders from April-May 2013 * Task 1.1.A. Take regular attendance and collect rosters * Task 1.1.B. Ascertain basic demographic information from professionals including occupation, age, gender, household income, and area of residence * Task 1.1.C. Track any exam scores of participants in classes * Activity 1.2: Collect data on students involved in educational programs from April-May 2013 * Task 1.2.A. Take regular attendance and collect rosters * Task 1.2.B. Ascertain basic demographic information from middle school, high school, college and adult students including age, gender, household income, and area of residence * Task 1.2.C. Track any attitude assessments of participants in classes Objective 2: Design a means to collect qualitative data on non-profit programs by May 2013. * Activity 2.1: Conduct several focus groups with professionals to determine their feelings and attitudes towards women and the non-profit educational program by May 2013 * Task 2.1.A.......

Words: 1696 - Pages: 7

Planning in Monitoring and Evaluation

...Inclusive Education Monitoring and Evaluation Officer; Education Project Officer Catholic Relief Services (CRS) is a US non-governmental organization that has been operating in Vietnam for more than 15 years. CRS projects assist local counterparts to build capacity in the areas of Education, HIV/AIDS care and treatment, Emergency preparedness and response. Reflecting our commitment to carry out quality programming to benefit the poor, we are now seeking dynamic Vietnamese candidates for two positions for our Inclusive Education Program based in Ha Noi: Title: Inclusive Education Monitoring and Evaluation Officer    Reports to: IVWD project manager Supervision: Not applicable PRIMARY FUNCTION: The Monitoring and Education (M&E) Officer will work closely with the Inclusive Education team to design and implement an effective and efficient monitoring, evaluation, documentation and reporting systems in support of inclusive education projects, including ”Inclusion of Vietnamese with Disabilities (IVWD)” and “Capacity Building for Parent Associations supporting Children with Disabilities (CBPA).” In addition, this position will serve as Project Officer for CBPA, responsible for facilitating planning, implementation, monitoring, financial tracking, and partner coordination for CBPA. Efforts will be divided between IVWD and CBPA based project needs. This position is based in Ha Noi with at least 30% travel to project sites. SPECIFIC RESPONSIBILITIES: - M&E project officer......

Words: 1737 - Pages: 7

Need for Monitoring and Evaluation

...Need for monitoring and evaluation of projects: 1. Provide constant feedback Monitoring and evaluation provides constant feedback on the extent to which the projects are achieving their goals. It also helps in checking for projects strengths and weaknesses, from the feedback elicited. 2. Identify potential problems Monitoring and evaluation helps in identifying potential problems at an early stage and propose possible solutions. 3. Monitor the accessibility of the project to all sectors of the target population. 4. Monitor the efficiency with which the different components of the project are being implemented and suggest improvements.Did it work or not, and why? How could it be done differently for better results? The interest is on what works, why and in what context. Decision makers, such as managers, use evaluations to make necessary improvements, adjustments to the implementation approach or strategies, and to decide on alternatives. Evaluations addressing these questions need to provide concrete information on how improvements could be made or what alternatives exist to address the necessary improvements. 5. Evaluate the extent to which the project is able to achieve its general objectives. 6. Provide guidelines for the planning of future projects (Bamberger 4). 7. Influence sector assistance strategy. Relevant analysis from project and policy evaluation can highlight the outcomes of previous interventions, and the strengths and weaknesses of their......

Words: 375 - Pages: 2

Condition Monitoring

...MOM350 CONDITION MONITORING AND MANAGEMENT PROJECT 2 – SPRING 2013 LINN WETTELAND STUD.NR 204592 “USING FAULT TREES TO DETERMINE THE ROOT CAUSE OF ROTATING EQUIPMENT FAILURES” (Robert X. Perez) In the paper “Using fault trees to determine the root cause of rotating equipment failures”, the author, Robert X Perez, explains through his own experience as a senior reliability engineer at Citgo Petroleum Corporation, and through examples of various events in different systems the importance of finding the root cause(s) of failures in rotating equipment. The author explains these “major failures causing significant undesired events are the result of a series of events, and compares it to the reaction of a domino line being tipped over by a single domino chip. And studying chain of event, or probable scenarios is at the heart of RFCA’s” (Perez) The author focuses on FTA (Fault tree analysis) as a tool to determine such root causes. And gives examples of cases where use of these tools could have OR have prevented multiple damages due to one component failure causing failure in surrounding components. RCFA – Root Cause Failure analysis “Root Cause Failure analysis is a structured process to identify any physical, human and latent causes of undesirable event(s).And how such a process can be used in achieving continuous plant reliability improvements by targeting mechanical and organizational deficiencies in a process facility” (Perez). A tool for “Identification and......

Words: 1529 - Pages: 7

Electronic Monitoring

...The widespread use of electronic devices during the Information Age has led to the electronic monitoring of employees by employers. It has become necessary for employers to provide computers, email, and internet access to its employees to conduct business efficiently. This type of access has provided misguided employees with the opportunity to conduct personal business and illegal activities at work. In an effort to address these risks many employers have implemented electronic monitoring tools. Employee monitoring is generally considered to be any type of tracking method used to watch what an employee does while at work. Electronic monitoring is monitoring employees' e-mail, computer files, voice mail, telephone use, as well as the use of video and audio surveillance, computer network monitoring, and keystroke monitoring. According to a 2008 survey done by the American Management Association, sixty six percent of the respondents stated that they were engaged in the electronic monitoring of their employees. Many reasons exist for employers to electronically monitor their employees. The monitoring of employees can lead to results that are beneficial to the employer. One reason employers cite for monitoring employees is to keep employee productivity from decreasing. Internet access allows employees to surf the internet for business purposes but employers fear that they will use it unproductively by visiting travel websites, recipe sites, message boards, shopping......

Words: 533 - Pages: 3

Rbm Monitoring

...RESULT BASED MANAGEMENT IN MONITORING DEFINATION OF TERMS Result Based Management (RBM) is a broad management strategy aimed at changing the way institutions operate, by improving performance, programmatic focus and delivery. It reflects the way an organization applies processes and resources to undertake interventions to achieve desired results. UNESCO (1997) Result Based Management (RBM) is an approach to project/programme management based on clearly defined results, and the methodologies and tools to measure and achieve them (International Federation of Red Cross and Red Crescent Societies, Geneva, 2011). Result Based Management (RBM) supports better performance and greater accountability by applying a clear, logical framework to plan, manage and measure an intervention with a focus on the result you want to achieve. By identifying in Advance the intended result of a project/programme and how we can measure their progress, Monitoring is the routine collection and analysis of information to track progress against set plans and check Compliance to established standards (International Federation of Red Cross and Red Crescent Societies, Geneva, 2011). The Organisation for Economic Cooperation and Development (OECD) (2002a:27) defines monitoring as a continuous function that uses the systematic collection of data on specified indicators to provide management and the main stakeholders of an ongoing development intervention with indications of the extent of......

Words: 1505 - Pages: 7

Policy Monitoring vs. Policy Evaluation Comparison

...Policy Monitoring vs. Policy Evaluation Comparison Team D: Aaron Sawyer, Paulette Banks, Buck Charley, Greg Bradley CJA/385 Criminal Justice Policy Analysis & Program Evaluation May 23, 2016 Professor: Dr. Duane Benton Policy Monitoring vs. Policy Evaluation Comparison Policy Monitoring Monitoring policies allows the gathering of factual information as to the causes and outcomes of criminal justice policies. For policy monitoring to be effective the information gathered must be relevant, reliable, and valid. Policy monitoring provides data on compliance, auditing, accounting, and outcomes of criminal justice policy. Policy monitoring further allows for the verification that policy goals and objectives are being met (Dunn, 2016, p. 245, 252). Policy monitoring allows for the analysis of how a policy is performing at different intervals throughout the implementation process. The monitoring process gives leadership measurements of the actual effects a policy is having towards the achievement of goals and objectives. Policy monitoring is a critical component in evaluating the policy process (Waterman, R. W., & Wood, B. D. (1993). Policy Evaluation The primary focus of policy evaluation is the facts and values derived through policy monitoring and implementation. While the facts can be developed through the statistical or qualitative measurements produced within the monitoring process, the evaluation process delves further into the true value through......

Words: 722 - Pages: 3

Buzz Monitoring

...Selection / Event Presentations / Best Practice / Template Files / Trends & Innovation  Online Reputation and Buzz Monitoring Buyer's Guide 2010 Online Reputation and Buzz Monitoring Buyer's Guide 2010 Published April 2010 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording or any information storage and retrieval system, without prior permission in writing from the publisher. Copyright © Econsultancy.com Ltd 2010 Econsultancy 4th Floor, The Corner 91-93 Farringdon Road London EC1M 3LN United Kingdom Econsultancy New York 41 East 11th St., 11th Floor New York, NY 10003 United States Telephone: +1 212 699 3626 http://econsultancy.com help@econsultancy.com Telephone: +44 (0) 20 7269 1450 Contents 1. Introduction ..................................................................... 1 1.1. About Econsultancy ..................................................................... 1 2. Executive Summary ......................................................... 2 3. Market trends .................................................................. 4 3.1. 3.2. 3.3. 3.4. 3.5. 3.6. 3.7. Market set for strong growth as rise of social media increases importance of online reputation ................................. 4 Buzz monitoring becomes a hygiene factor for businesses seeking to manage risk......

Words: 54467 - Pages: 218

Evaluation

...The outcome evaluations are evaluations that are looking at the usefulness of interference. Some approaches are in use for the interventions that have been inspected to establish the effect they may have on any target population over time. Within this evaluation post-intervention and pre-intervention data is brought together. The outcome evaluations give up data about whether or not the results can be replaced as well as the program trustworthiness. Some examples of the outcome evaluations are when the number of surveys is being conducted are rising. Another example is when a business is showing the earned income from the profits. The process evaluation is an evaluation that shows the distinctiveness of the process evaluation method and how they are monitoring and credentials of the program planning, related program fundamentals and accomplishment. The process evaluation method employs quantitative and qualitative measure to review the complete suitability and success of the program remunerations. When there are staff questionnaires are in play, they are used to collect great information for development, planning, activities execution, scheduling, organizational administration and collaborative and community roles. This process allows for corrections to be made when the process is missing information. The process evaluation also gather information around the communities, it helps to assist them. The training and hiring process are also scrutinized. Some examples of process......

Words: 258 - Pages: 2

Effects of Evaluation and Monitoring of Ecde Programmes on Performance of Ecde Children in Kiplobotwo Zone, Longisa Division, Bomet County.

...EFFECTS OF EVALUATION AND MONITORING OF ECDE PROGRAMMES ON PERFORMANCE OF ECDE CHILDREN IN KIPLOBOTWO ZONE, LONGISA DIVISION, BOMET COUNTY. PRESENTED BY CHEROTICH NAOMI INDEX NO. 50802011 A Research project Report submitted to Kenya National Examination Council in partial fulfillment of the Requirements for the Award of Diploma in Early Childhood Development and Education of Longisa ECDE Teachers Training College. November 2011 DECLARATION AND RECOMMENDATION DECLARATION This research project is my original work and has not been present for the award of diploma in this or any other college. Signature_______________________ Date_______________________ Name: Cherotich Naomi Index No. 50802011 RECOMMENDATION This research project has been submitted with the approval of college supervisor. Signature________________________ Date________________________ Name: Mrs Lena Rono DEDICATION Dedicated to my beloved husband, Tim, Max, Mom and Dad, and anyone else who baby-sat for me so that I could go to college and write this research. Thanks to Mary, Lilian, Jacob, Christine and Anne. Thanks to Joseph for reading my research and urging me on. Thanks also to my editors, Winnie and Norah. Thank you Mum and Dad again for supporting me. ACKNOWLEDGEMENT I would wish to express my sincere gratitude to our......

Words: 1044 - Pages: 5

Security Monitoring

...Introduction [Writing suggestion: Avoid using "intro" or "introduction" if this is a subtitle. At the beginning of the essay, the following could be nothing else] One of the biggest concerns in today’s society relates to security in internal IT and e-commerce applications. Security is handled by passing and transactions between client browser and Internet server entering a secure site. The client browser is passed a public key by which transactions between client, and the web is encrypted. The process of monitoring security plays a vital function in any organization’s computer use both internally and externally. Security Organization Within a secure organization the business structure can cover a system of financial control, such as payroll, human resources, inventory, and general ledger vary the variety of agencies of the organization may be enhanced. Vulnerabilities in organizations will diminish, staff may be eliminated and so will duplications of work within departments, monetary information can stay secure, and most customer service may be better. Internal IT Internal IT is a beneficial service such as, compliance with federal and state laws, add valve to an organization’s internal control. Safeguarding the organization assets, and risk management just to name a few, mainly deals with computer applications monitors and manages employee’s activities, for instance it more of a help desk, side services, or a desk-side service infrastructure and application......

Words: 663 - Pages: 3

Security Monitoring

...Security Monitoring Russell McKay July 23, 2012 CMGT/442 William Glassen Security Monitoring Organizations in pursuit of success are challenged by taking risks. This challenge necessitates a call for risk assessment and defense through security processes. Evaluation of risks and assessment lends to defensive strategies producing a high level of security in relation to acceptable cost. Modern business endeavors of electronic commerce or e-commerce find a two front strategy between internal and external risk strategies. Security monitoring offers a measure of defense to both internal information technology and external risk from e-commerce applications. Event Monitoring Security as event monitoring inspects inbound and outbound network activity for suspicious patterns indicating an intrusion attempt. Common behaviors of users and processes create a baseline by documentation for determining normal activity. This baseline is able to provide a determination by monitoring between acceptable and unacceptable activities. Administrating to the detection system require sensitivity to techniques and methods of users for minimum levels of security that allow normal user functioning. Internal Information Technology Basic internal IT applications such as inventory, payroll, general ledger, and human resources are vulnerable to various risks. Risks include viruses, worms, identity theft, money and proprietary misappropriations. Internal controls as described by the Committee...

Words: 747 - Pages: 3