scholarly journals Ex Ante and Ex Post Evaluations: Two Sides of the Same Coin?

2015 ◽  
Vol 6 (1) ◽  
pp. 47-56 ◽  
Author(s):  
Lut Mergaert ◽  
Rachel Minto

This article engages with two themes of contemporary EU governance: the role of evaluations within an effective and coherent policy–making process and the EU's constitutionalised commitment to promoting gender equality in all its activities (Article 8 TFEU). It focuses on the interface between ex ante and ex post evaluation and the contribution of evaluations to policy learning, with particular attention to the promotion of gender equality. A case study approach is followed, with EU research policy as the object of analysis.

2016 ◽  
Vol 17 (3) ◽  
pp. 283-305 ◽  
Author(s):  
Catherine Liston-Heyes ◽  
Carol Daley

A key feature of voluntourism is that participants expect both to be entertained and to help others to different extents. The duality between the leisure and volunteering aspects of the trip creates ambiguities in expectations. This article focusses on group sensemaking about this leisure-volunteer duality and the role of trip leaders in its management. It uses a case study approach to investigate the behaviours of participants on a voluntourist trip to South America. Among other things, it compares participants’ ex ante expectations with ex post evaluations of the trip and tracks the events that shaped views on the quality of the experience. More concretely, the key events that triggered conflicts between the leisure and volunteer dimensions of the trip are identified and analysed using the factors that influenced the sensemaking outcome. Implications centre on the importance and use of sensemaking tools for voluntourist organisations and trip leaders in the management of the leisure-volunteer tensions that are part and parcel of voluntourism.


2014 ◽  
Vol 5 (2) ◽  
pp. 173-193 ◽  
Author(s):  
Elizabeth Kopits ◽  
Al McGartland ◽  
Cynthia Morgan ◽  
Carl Pasurka ◽  
Ron Shadbegian ◽  
...  

Abstract:EPA has conducted several ex post assessments of regulatory compliance costs, with the ultimate goal of identifying ways to improve ex ante cost estimation. The work to date has culminated in four case studies that examine five regulations using a common conceptual framework. The standardized framework provides a systematic way to investigate key drivers of compliance costs to see if judgments can be made about why and how ex ante and ex post estimates of costs differ. In addition to describing this conceptual framework, we describe the criteria used to select the rules to be analyzed, summarize the main hypotheses for why ex ante and ex post cost estimates may differ and discuss some of the challenges encountered in conducting these ex post analyses.


2018 ◽  
Vol 9 (3) ◽  
pp. 121-134 ◽  
Author(s):  
Youcef J-T. Zidane ◽  
Bjørn Otto Elvenes ◽  
Knut F. Samset ◽  
Bassam A. Hussein

Abstract Ex-post evaluation is starting to be recognized in the Algerian different government institutions (e.g., ministries); and evaluation is becoming part of any program or project for two main reasons, justify the legitimacy of the programs and projects, and collect lessons learned for the next similar programs and projects. On the other hand, academicians believe that programs and projects can be improved by conducting proper evaluations and extracting lessons learned. Program/Project evaluation is comprehensive evaluation, which mainly applies to ex-post evaluation. This paper will look closer at an ex-post evaluation of an Algerian highway megaproject based on PESTOL model, this evaluation is already conducted in the period of 2014 – 2016. Considering ex-post evaluation of projects has many purposes and among them is linked to learning and knowledge sharing and transfer. In this regard, the paper describes very briefly the approach used to the post project evaluation. In addition, link it to learning and to other types of evaluations – i.e., ex-ante, monitoring, midterm, terminal evaluations, and using system-thinking approach, and proposes a framework for learning in projects by evaluations. This paper is based on qualitative case study approach.


2018 ◽  
Vol 11 (1) ◽  
pp. 80-97
Author(s):  
Michel Leseure

There is a rich academic literature about scenario planning expressing concerns with improving the effectiveness of scenario analysis as a process and with scenario methods being misused. Controlling for process execution and reacting to unforeseen events to avoid downside risks is the domain of operational control. Mechanisms for operational control are normally deployed ex ante, in-process, and ex post. A review of the scenario analysis literature from an operational control perspective leads to the conclusion that ex ante control mechanisms are extensively discussed. In-process control mechanisms are also discussed extensively but only by some authors. Ex post controls are almost never discussed. This suggests that when a scenario analysis goes wrong it cannot be reworked or recovered. This is a surprising implicit proposition and this article uses a case study approach to challenge this omission and to conclude that, like for many other business processes, rework and recovery of scenario analysis can be a legitimate and valuable activity.


2015 ◽  
Vol 6 (1) ◽  
pp. 27-34 ◽  
Author(s):  
Claire A. Dunlop ◽  
Claudio M. Radaelli

In this article, we present some major lessons drawn from a recently completed research project. Our research dealt with ex ante evaluation, mainly impact assessment (IA).We shed new light on research questions about the control of bureaucracy, the role of IA in decisionmaking, economics and policy learning, and the narrative dimension of appraisal.We identify how our findings stand in relation to conventional arguments about these issues, and reflect on their normative implications. We finally reason on the possible extensions of our arguments to the wider field of policy evaluation, connecting IA and ex post evaluation.


2019 ◽  
Vol 22 (4) ◽  
pp. 744-752
Author(s):  
Sisira Dharmasri Jayasekara ◽  
Iroshini Abeysekara

Purpose The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context. Design/methodology/approach This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study. Findings The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions. Research limitations/implications This study was limited to the members of the BIMSTEC. Originality/value This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.


2017 ◽  
Vol 39 (8) ◽  
pp. 1194-1209 ◽  
Author(s):  
Marwan M Kraidy

Islamic State’s (IS) image-warfare presents an auspicious opportunity to grasp the growing role of digital images in emerging configurations of global conflict. To understand IS’ image-warfare, this article explores the central role of digital images in the group’s war spectacle and identifies a key modality of this new kind of warfare: global networked affect. To this end, the analysis focuses on three primary sources: two Arabic-language IS books, Management of Savagery (2004) and O’ Media Worker, You Are a Mujahid!, 2nd Edition (2016), and a video, Healing the Believers’ Chests (2015), featuring the spectacular burning of a Jordanian air force pilot captured by IS. It uses the method of ‘iconology’ within a case-study approach. I analyze IS’ doctrine of image-warfare explained in the two books and, in turn, examine how this doctrine is executed in IS video production, conceptualizing digital video as a specific permutation of moving digital images uniquely able to enact, and via repetition, to maintain, visual and narrative tension between movement and stillness, speed and slowness, that diffuses global network affect. Using a theoretical framework combining spectacle, new media phenomenology, and affect theory, the article concludes that global networked affect is projectilic, mimicking fast, lethal, penetrative objects. IS visual warfare, I argue, is best understood through the notion of the ‘projectilic image’.


2021 ◽  
Vol 6 (3) ◽  
pp. 25-44
Author(s):  
Siti Nur'Aini

This study investigates how university students engage with their learning affordances in a contested environment due to the Coronavirus pandemic. This qualitative research employed a case study approach involving 136 participants. Data analysis was conducted using qualitative analysis as a circular process to describe, classify, and perceive the phenomenon and how the learning, affordances, and society were interconnected. The main framework of the research was the theory of affordance and how it was available for university students in their learning environment that changed due to the COVID-19 pandemic. Data were collected in the first semester of 2020 through an online survey on Google form. The findings indicate the importance of the social environment to provide affordance for the students to adjust with them. Four kinds of affordances emerged from the study; internet affordance, assignment affordance, domestic affordance, and distance learning affordance. The role of the social environment is definitive in changing how students manage their affordances.


Sign in / Sign up

Export Citation Format

Share Document