Crisp-DM Implementation for Elderly Social Protection
Keywords:Social Assistance, Crisp Dm, SVM, Classification
AbstractIn Jakarta, social assistance is available for specific categories of older adults but is given by Conditional Cash Transfer (CCT). Technical assistance is based on a database of beneficiaries and its mining due to the regulation registry. The sub-national social government maintains a Mining database. The author uses a database in one of the districts as a case study. The author uses Crisp DM to understand this social welfare problem because it has its logic of understanding, the logic and the details of pre-processing the data. Then, to decide, used a Support Vector Machine (SVM) as a model and tested it with cross-validation. To obtain the classification accuracy formed from the data processing results. This research aims to see the predictive results of the distribution of KLJ program assistance. Then, answer the form of modeling to create a decision system for the distribution of KLJ. For this reason, SVM is used to make decisions related to social assistance issues. In the SVM, which consists of two classes, it can be interpreted that one class contains “stop” while the other “receive”. However, there are offers bias in the data processing, with the "if" condition. The data processing reaches 100% accuracy and gets SVM kernel weight.
Agarwal, S. (2014). Data mining: Data mining concepts and techniques. In Proceedings - 2013 International Conference on Machine Intelligence Research and Advancement, ICMIRA 2013. https://doi.org/10.1109/ICMIRA.2013.45
Almaspoor, M. H., Safaei, A., Salajegheh, A., Minaei-Bidgoli, B., & Safaei, A. A. (2021). Support Vector Machines in Big Data Classiication: A Systematic Literature Review Support Vector Machines in Big Data Classification: 1 A Systematic Literature Review 2 3.
Anderson, R., & Mansingh, G. (2014). Data Mining Approach to Decision Support in Social Welfare. International Journal of Business Intelligence Research, 5(2), 39–61. https://doi.org/10.4018/ijbir.2014040103
Balasubramanian, T. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(6), 837–853. https://doi.org/10.1109/TSMCC.2011.2177258
Barca, V. (2017). Integrating data and information management for social protection: (Issue October).
Cao, L. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(6), 837–853. https://doi.org/10.1109/TSMCC.2011.2177258
Dadap-Cantal, E. L., Fischer, A. M., & Ramos, C. G. (2021). Targeting versus social protection in cash transfers in the Philippines: Reassessing a celebrated case of social protection. Critical Social Policy, 41(3), 364–384. https://doi.org/10.1177/02610183211009891
Gutiérrez, J. M. (2010). and classifying documents. 280485.
Henman, P., & Adler, M. (2003). Information technology and the governance of social security. Critical Social Policy, 23(2), 139–164. https://doi.org/10.1177/0261018303023002002
Javid, T., Gupta, M. K., & Gupta, A. (2022). A hybrid-security model for privacy-enhanced distributed data mining. Journal of King Saud University - Computer and Information Sciences, 34(6), 3602–3614. https://doi.org/10.1016/J.JKSUCI.2020.06.010
Kum, H.-C. (Monica), Duncan, D., Flair, K., & Wang, W. (2003). Social welfare program administration and evaluation and policy analysis using knowledge discovery and data mining (KDD) on administrative data. Dg.o 2003: Proceedings of the 2003 Annual National Conference on Digital Government Research, October 2015, 1–6.
Kumar, A., Agrawal, R., Wankhede, V. A., Sharma, M., & Mulat-weldemeskel, E. (2022). A framework for assessing social acceptability of industry 4.0 technologies for the development of digital manufacturing. Technological Forecasting and Social Change, 174. https://doi.org/10.1016/J.TECHFORE.2021.121217
Larose, D. T., & Larose, C. D. (2014). DISCOVERING KNOWLEDGE IN DATA An Introduction to Data Mining Second Edition Wiley Series on Methods and Applications in Data Mining. In IEEE Computer Society.
Martinez-Plumed, F., Contreras-Ochando, L., Ferri, C., Hernandez-Orallo, J., Kull, M., Lachiche, N., Ramirez-Quintana, M. J., & Flach, P. (2021). CRISP-DM Twenty Years Later: From Data Mining Processes to Data Science Trajectories. IEEE Transactions on Knowledge and Data Engineering, 33(8), 3048–3061. https://doi.org/10.1109/TKDE.2019.2962680
Ncr, P. C., Spss, J. C., Ncr, R. K., Spss, T. K., Daimlerchrysler, T. R., Spss, C. S., & Daimlerchrysler, R. W. (2000). Crisp-Dm. SPSS Inc, 78, 1–78.
Nur Adiha, R., Andani, S. R., & Saputra, W. (2021). Application of Data Mining in Determining Social Assistance Recipients With C4.5 Algorithm in Maligas Mountain District. International Journal of Basic and Applied Science, 10(3), 88–99. https://doi.org/10.35335/ijobas.v10i3.59
OECD. (2019). Social Protection System Review of Indonesia, OECD Development Pathways, OECD.
Park, J. Y., Mistur, E., Kim, D., Mo, Y., & Hoefer, R. (2022). Toward human-centric urban infrastructure: Text mining for social media data to identify the public perception of COVID-19 policy in transportation hubs. Sustainable Cities and Society, 76. https://doi.org/10.1016/J.SCS.2021.103524
Plotnikova, V., Dumas, M., & Milani, F. P. (2022). Applying the CRISP-DM data mining process in the financial services industry: Elicitation of adaptation requirements. Data and Knowledge Engineering, 139. https://doi.org/10.1016/J.DATAK.2022.102013
Rao, S. (2016). National databases of the poor for social protection. April. https://doi.org/10.13140/RG.2.1.1162.0241
Satish Kumar, A., & Revathy, S. (2022). A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks. Theoretical Computer Science, 927, 15–30. https://doi.org/10.1016/J.TCS.2022.05.018
Saura, J. R., Palacios-Marqués, D., & Ribeiro-Soriano, D. (2021). Using data mining techniques to explore security issues in smart living environments in Twitter. Computer Communications, 179, 285–295. https://doi.org/10.1016/J.COMCOM.2021.08.021
Surono, A. (2019). Kartu Lansia Jakarta Edisi 2019. Acurat.Co. https://akurat.co/kartu-lansia-jakarta-edisi-2019
TNP2K. (2015). Indonesia ’ s Unified Database for Social Protection Programmes Management Standards. 3–4.
Yaliwal, S., Yaliwal, P., & Mirjankar, N. (2016). Data Mining on Social Security and Social. 35–40.
Zambrano, P., Torres, J., Tello-Oquendo, L., Yánez, Á., & Velásquez, L. (2023). On the modeling of cyber-attacks associated with social engineering: A parental control prototype. Journal of Information Security and Applications, 75. https://doi.org/10.1016/J.JISA.2023.103501
Copyright (c) 2023 Wahyu sarjono, Muhamad Samiaji
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.