2018
DOI: 10.1088/1742-6596/1007/1/012038
|View full text |Cite
|
Sign up to set email alerts
|

Text Mining of UU-ITE Implementation in Indonesia

Abstract: Abstract.At present, social med ia and networks act as one of the main platforms for sharing informat ion, idea, thought and opinions. Many people share their knowledge and express their views on the specific topics or current hot issues that interest them. The social media texts have rich information about the complaints, comments, recommendation and suggestion as the automatic react ion or respond to government in itiat ive or policy in order to overco me certain issues.This study examines the sentiment fro … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Importantly, the method stages determine the success of the research to assure its validity and reliability [16][17][18][19][24][25][26][27][28][29][30][31]. Figure 1 is a flowchart that describe the detail of the steps undertaken to complete this research, which is include NPC Agent Design, Design of Environment, Design of Enemy, Design of HFSM for NPC Agent and Design of FSM for Enemies, then continue with various test scenarios.…”
Section: Methodsmentioning
confidence: 99%
“…Importantly, the method stages determine the success of the research to assure its validity and reliability [16][17][18][19][24][25][26][27][28][29][30][31]. Figure 1 is a flowchart that describe the detail of the steps undertaken to complete this research, which is include NPC Agent Design, Design of Environment, Design of Enemy, Design of HFSM for NPC Agent and Design of FSM for Enemies, then continue with various test scenarios.…”
Section: Methodsmentioning
confidence: 99%
“…In this process there are four main activities performed: punctuation removal, stop words removal, tokenization, and stemming. Stop words removal is the process of removing the words that have no significant meaning [15]. Tokenizing is the process of breaking sentences into words.…”
Section: Fig 1 Conceptual Modelmentioning
confidence: 99%
“…This approach yielded an accuracy result of 83.33% for recall, 50% for precision, and 62.5% for f-measure. Another research endeavor by Hakim et al [17] explored the clustering of cybercrime cases under the ITE Law, utilizing the k-means algorithm to classify the cases into five distinct clusters.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, the current investigation uses mutual information, TF-IDF, and the SVM algorithm to classify cybercrime cases, presenting a different approach. Another study by Hakim et al [17] used text mining to cluster cases linked to the ITE Law, with data sourced from Twitter posts. They applied TF-IDF for this purpose.…”
Section: Introductionmentioning
confidence: 99%