Practical Guide For Policy Analysis: The Eightf...
Practical Guide For Policy Analysis: The Eightf... ->->->-> https://urlca.com/2tl7JV
\"Professors Bardach and Patashnik's \"Eightfold Path\" provides a wise and engaging how-to guide that meets the central challenge of policy analysis: combining scientific evidence and social goals to craft practical, real-world solutions.\"
A Practical Guide for Policy Analysis still remains the most accessible and practical guide for those learning the craft of public policy analysis. It offers a clear road map to conduct effective policy analysis, and provides a terrific list of useful resources and helpful hints to do so. The newer substantive chapters in the book on design problems, gathering political support, and asking the right questions make clear that the authors believe, justifiably, that policy analysis is not a linear craft and that policy adoption is not strictly technical. The additional chapter on understanding the role of big data in policy analysis is terrific and exposes readers to an important question in policy analysis of what is evidence. The Guide should be required reading for all students in public affairs type undergraduate- and graduate-level programs.\"
Considering the pace of change in society, and especially in information technology, the book faces a daunting challenge in providing concrete, up-to-date guidance on assembling evidence. For example, students are led by the hand through the practical aspects of setting up appointments to interview key stakeholders, but disconcertingly this section makes no reference to email. This section also fails to point out new technology-driven approaches policy researchers can use to good effect, such as identifying connections to stakeholders through online social networks or conducting interviews with geographically dispersed stakeholders via Skype.
Overall, I am delighted that this highly accessible guide has been updated and will continue to play an important role in the professional development of policy analysts. Public policy is a field that lends itself to technocratic jargon and ideological bias, and this book does the field a valuable service by steering clear of both. While the book contains enough depth to stimulate critical thought, its greatest contribution is in presenting a concrete plan of action for anyone who needs to perform a policy analysis.
Reference Texts: Telecommunications Law and Policy, Stuart Minor Benjamin and James B. Speta, Carolina Academic Press. (publisher, UCI reserve) Shaping American Telecommunications, Christopher H. Sterling, Phyllis W. Bernt, Martin B.H. Weiss, Lawrence Erlbaum Associates, Publishers. (publisher, UCI reserve) Telecommunications Law in the Internet Age, Sharon K. Black, Morgan Kaufmann Publishers. (publisher, UCI reserve) Digital Crossroads: Telecommunications in the Internet Age, Jonathan E. Nuechterlein; and Philip J. Weiser, MIT Press. (IEEE Xplore [available online on campus or through VPN] (UCI reserve) Computer Networks, Andrew Tanenbaum and David Wetherall. (publisher, UCI reserve) A practical guide for policy analysis: the eightfold path to more effective problem solving, Eugene Bardach and Eric M. Patashnik, Sage Publishing. (publisher, UCI reserve) Policy on Academic Honesty: UCI Policy on Academic Integrity. This includes a definition of plagiarism. On problem sets, you are strongly encouraged to work in groups to discuss your approach to solving each problem, but you must work individually in progressing from that point toward the solution. You must turn in only your own work. Use of any solutions from any source other than a student's own work is considered plagiarism. On case studies, the work presented is expected to represent the participation of all members of the group. Anything that is other than the group's own work must be properly cited or it is considered plagiarism. Students agree that by taking this course all required papers are subject to submission for textual similarity review to Turnitin.com for the detection of plagiarism. All submitted papers will be included as source documents in the Turnitin.com reference database solely for the purpose of detecting plagiarism of such papers. Use of the Turnitin.com service is subject to the Usage Policy agreement posted on the Turnitin.com site. Add Drop Policy: ICS add/drop policy 59ce067264