Cyberbullying Analysis on Instagram Using K-Means Clustering
Abstract
Keywords
References
[1] Ministry of Communications and Information Technolog, “Networking is Increasing, Indonesia Needs to Increase Cultural Values on the Internet” 2021. Https://Aptika.Kominfo.Go.Id/2021/09/Warganet-Meningkat-Indonesia-Perlu-Tingkatkan-Nilai-Budaya-Di-Internet/ (Accessed May 02, 2022) (In Indonesia Languange).
[2] L. Fazry And N. Cipta Apsari, “The Effect of Social Media on Cyberbullying Behavior Among Adolescents,” J. Pengabdi. Dan Penelit. Kpd. Masy., Vol. 2, No. 1, Pp. 28–36, 2021, [Online]. Available: Https://Ejournal.Bsi.Ac.Id/Ejurnal/Index.Php/Cakrawala/Article/Viewfile/3680/2624 (In Indonesia Languange).
[3] F. Tapia, C. Aguinaga, And R. Luje, “Detection Of Behavior Patterns Through Social Networks Like Twitter, Using Data Mining Techniques As A Method To Detect Cyberbullying,” Appl. Softw. Eng. - Proc. 7th Int. Conf. Softw. Process Improv. Cimps 2018, Pp. 111–118, 2019, Doi: 10.1109/Cimps.2018.8625625.
[4] P. W. Imam Riadi, Sunardi, “Investigating Cyberbullying On Whatsapp Using Digital Forensics,” Rekayasa Sist. Dan Teknol. Inf., Vol. 1, No. 10, Pp. 730–735, 2021 (In Indonesia Languange).
[5] O. C. Hang And H. M. Dahlan, “Cyberbullying Lexicon For Social Media,” Int. Conf. Res. Innov. Inf. Syst. Icriis, Vol. December-2, 2019, Doi: 10.1109/Icriis48246.2019.9073679.
[6] R. Pawar And R. R. Raje, “Multilingual Cyberbullying Detection System,” Ieee Int. Conf. Electro Inf. Technol., Vol. 2019-May, Pp. 040–044, 2019, Doi: 10.1109/Eit.2019.8833846.
[7] F. Tapia And C. Aguinaga, “Detección De Patrones De Comportamiento A Través De Redes Sociales Como Twitter , Utilizando Técnicas De Minería De Datos Como Método Para Detectar El Acoso Cibernético Detection Of Behavior Patterns Through Social Networks Like Twitter , Using Data Minin,” 2018 7th Int. Conf. Softw. Process Improv., Pp. 111–118, 2018, Doi: 10.1109/Cimps.2018.8625625.
[8] M. Habibi And P. W. Cahyo, “Clustering User Characteristics Based On The Influence Of Hashtags On The Instagram Platform,” Ijccs (Indonesian J. Comput. Cybern. Syst., Vol. 13, No. 4, P. 399, 2019, Doi: 10.22146/Ijccs.50574.
[9] M. Z. Naf’an, A. A. Bimantara, A. Larasati, E. M. Risondang, And N. A. S. Nugraha, “Sentiment Analysis Of Cyberbullying On Instagram User Comments,” J. Data Sci. Its Appl., Vol. 2, No. 1, Pp. 88–98, 2019, Doi: 10.21108/Jdsa.2019.2.20.
[10] J. Suryanto, “Comparative Analysis of 15 Daily Rainfall Groupings in DIY Province Using Fuzzy Clustering and K-Means Clustering,” Vol. Xvi, Pp. 229–242, 2017 (In Indonesia Languange).
[11] M. H. Adiya And Y. Desnelita, “Application of K-Means Algorithm for Drug Data Clustering at Pekanbaru Hospital,” Vol. 01, Pp. 17–24, 2019 (In Indonesia Languange).
[12] Rsa, “2016: Current State Of Cybercrime,” P. 7, 2016, [Online]. Available: Https://Www.Rsa.Com/Content/Dam/Rsa/Pdf/2016/05/2016-Current-State-Of-Cybercrime.Pdf.
[13] H. S. Christopher D. Manning, Prabhakar Raghavan, Introduction To Modern Information Retrieval. 2009.
[14] I. Ruthven And M. Lalmas, “A Survey On The Use Of Relevance Feedback For Information Access Systems,” Knowl. Eng. Rev., Vol. 18, No. 2, Pp. 95–145, 2003, Doi: 10.1017/S0269888903000638.
[15] S. K. Sahu, S. Sarangi, And S. K. Jena, “A Detail Analysis On Intrusion Detection Datasets,” Souvenir 2014 Ieee Int. Adv. Comput. Conf. Iacc 2014, Pp. 1348–1353, 2014, Doi: 10.1109/Iadcc.2014.6779523.
[16] R. Riyaddulloh And A. Romadhony, “Normalization of Indonesian Text Based on Slang Dictionary Case Study: Tweet Product Gadgets on Twitter,” Eproceedings Eng., Vol. 8, No. 4, Pp. 4216–4228, 2021, [Online]. Available: Https://Openlibrarypublications.Telkomuniversity.Ac.Id/Index.Php/Engineering/Article/View/15246/14969 (In Indonesia Languange).
[17] E. W. Selberg, “Information Retrieval Advances Using Relevance Feedback,” Uw Dept Cse Gen. Exam, 1997, [Online]. Available: Http://Www.Cs.Rpi.Edu/~Chapaa/Userskill/Paper/Generals.Pdf.
[18] P. Yugianus, H. S. Dachlan, And R. N. Hasanah, “Development of a Library Catalog Search System Using the Rocchio Relevance Feedback Method,” J. Eeccis, Vol. 7, No. 1, Pp. 47–52, 2013 (In Indonesia Languange).
[19] I. Riadi, J. E. Istiyanto, A. Ashari, And Subanar, “Internet Forensics Framework Based-On Clustering,” Vol. 4, No. 12, Pp. 115–123, 2013.
[20] M. Zulfadhilah, Y. Prayudi, And I. Riadi, “Cyber Profiling Using Log Analysis And K-Means Clustering,” Int. J. Adv. Comput. Sci. Appl., Vol. 7, No. 7, Pp. 430–435, 2016, Doi: 10.14569/Ijacsa.2016.070759.
[21] W. A. Luqyana, I. Cholissodin, And R. S. Perdana, “Analysis of Cyberbullying Sentiment on Instagram Comments With Support Vector Machine Classification Method,” J. Pengemb. Teknol. Inf. Dan Ilmu Komput. Univ. Brawijaya, Vol. 2, No. 11, Pp. 4704–4713, 2018 (In Indonesia Languange).
DOI: 10.30595/juita.v10i2.14490
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2579-8901
- Visitor Stats
View JUITA Stats