The meanings attributed to Female Genital Mutilation/Cutting (FGM/C) are shaped through complex negotiations within religious and socio-cultural frameworks, including those observed in Indonesia. Using a combined qualitative and quantitative (mixed methods)-ethnographic and survey approach, data from 109 students of religious tertiary institutions in East Kalimantan on their perspectives on FGM/C practices can be more comprehensively explored. The results of the study, which were analysed using the three principles of symbolic interactionism, showed that 72.5 per cent of religious college student families still practice FGM/C and 53.2 per cent stated that FGM/C practices are beneficial for women. However, they are also willing, if asked, to help socialise FGM/C prevention with a percentage of 54.1 percent. This research contributes to revealing the constitutive communication owned by religious tertiary students with the emergence of negotiations on the meaning of FGM/C practices originating from the family environment and from the environment where they pursue higher education. Prevention efforts will have a greater impact when the Government collaborates with the parties according to their contribution. This research contributes to bridging the gap between the traditional understanding that lives in the cultural and religious values of the family and the critical perspective in the academic environment through an inclusive dialogue space to create zero tolerance for the practice of FGM/C, not only in East Kalimantan but also in Indonesia. ***** Pemaknaan seputar praktik Pemotongan dan Pelukaan Genitalia Perempuan (P2GP) terbentuk melalui negosiasi yang kompleks dalam kerangka keagamaan dan sosio-kultural, termasuk yang terjadi di Indonesia. Dengan menggunakan pendekatan gabungan kualitatif dan kuantitatif (mixed methods), data yang berasal dari 109 mahasiswa perguruan tinggi keagamaan di Kalimantan Timur tentang perspektif mereka terhadap praktik P2GP dapat lebih komprehensif dieksplorasi. Hasil penelitian yang dianalisis menggunakan tiga prinsip interaksionisme simbolik menunjukkan sebanyak 72,5 persen keluarga mahasiswa perguruan tinggi keagamaan masih melakukan praktik P2GP dan 53,2 persen menyatakan bahwa praktik P2GP bermanfaat bagi perempuan. Namun mereka juga bersedia jika diminta untuk membantu sosialisasi pencegahan P2GP dengan prosentase sebesar 54,1 persen. Penelitian ini berkontribusi mengungkap komunikasi konstitutif yang dimiliki oleh mahasiswa perguruan tinggi keagamaan dengan munculnya negosiasi terhadap makna praktik P2GP yang berasal dari lingkungan keluarga dan dari lingkungan tempat mereka menempuh pendidikan tinggi. Upaya pencegahan akan memiliki dampak yang lebih besar ketika Pemerintah berkolaborasi dengan para pihak sesuai dengan kontribusi yang dimiliki. Penelitian ini berkontribusi untuk menjembatani adanya kesenjangan antara pemahaman tradisional yang hidup dalam nilai budaya dan agama keluarga dengan perspektif kritis di lingkungan akademis melalui ruang dialog yang inklusif untuk mewujudkan toleransi nol pada praktik P2GP tidak hanya di Kalimantan Timur tetapi juga di Indonesia.
The research sought to identify the objective trends of postgraduate students at the College of Political Science - University of Baghdad for the period from 2000-2012 through the objective trends of university theses and dissertations and what are the most and least studied topics, with a re-adjustment of previously studied topics towards topics that serve issues of concern to society and avoiding topics that have been studied a lot to avoid repetition. The research came out with the following results, the most prominent of which are: The total number of what was accomplished in this college is 401 theses and dissertations, and the dissertations had the largest share of them, as their percentage reached 69%, with 275 theses compared to 126
... Show MoreIn our time, not too long ago, the universities of the world have been fast to take care of the study of an innovative type of technical and human studies, called the science of "comparative literature". Comparative research studies have grown and flourished rapidly in response to the demands of both mental and artistic life. This shows the increasing awareness at both the modern national and the international levels in order to develop through connecting with the international intellectual, nental and artistic currents to nurture ethics and originality. Comparative studies show that the beginning of the comparative literature goes back to the time when the Latin literature was connected to the Greek literature and th
... Show MoreBackground: Most adult smokers start smoking regularly some time before 18 years of age. Cigarette smoking is a major ‘preventable’ cause of morbidity and mortality worldwide. It is well-known that smoking has hazardous effect on many systems like pulmonary and cardiovascular system.
Objectives: Study the prevalence of smoking among school pupils according to the mode of smoking, age, school grade, school environment and possible health risk associated with smoking. Type of the study: A cross-sectional study.
Methods: Study was conducted between 1st of March 2014 to 30th of May 2014 at Al-Doura/Al- Kurkh/Baghdad by using convenient sample, including all pupils from 6 schools. The schools were 2 secondary schools, 3 in
... Show MoreIntroduction: Sleep, an essential therapeutic part of human physiology, Sleep problems was widespread among students in medical colleges, and excessive stress and the pressure of holding grades can affect their sleep quality. The relationship between sleep, stress and cognition/learning is far more complex than perceived. Material and Method: Cross sectional study was conducted in Al-Kindy College of Medicine, during the period from (2022 to 2023) academic year. The electronic questionnaire was distributed among all students. Analysis of data was carried out using IBM SPSS version 24. Results: A total of (500) medical students' online surveys were analyzed from AL-Kindy College of Medicine, The highest number of participants was fro
... Show MoreThe research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More