Crisp-DM Implementation for Elderly Social Protection


  • Wahyu sarjono Information System and Management, BINUS University
  • Muhamad Samiaji Information System and Management, BINUS University



Social Assistance, Crisp Dm, SVM, Classification


In Jakarta, social assistance is available for specific categories of older adults but is given by Conditional Cash Transfer (CCT). Technical assistance is based on a database of beneficiaries and its mining due to the regulation registry. The sub-national social government maintains a Mining database. The author uses a database in one of the districts as a case study. The author uses Crisp DM to understand this social welfare problem because it has its logic of understanding, the logic and the details of pre-processing the data. Then, to decide, used a Support Vector Machine (SVM) as a model and tested it with cross-validation. To obtain the classification accuracy formed from the data processing results. This research aims to see the predictive results of the distribution of KLJ program assistance. Then, answer the form of modeling to create a decision system for the distribution of KLJ. For this reason, SVM is used to make decisions related to social assistance issues.  In the SVM, which consists of two classes, it can be interpreted that one class contains “stop” while the other “receive”. However, there are offers bias in the data processing, with the "if" condition. The data processing reaches 100% accuracy and gets SVM kernel weight.


Agarwal, S. (2014). Data mining: Data mining concepts and techniques. In Proceedings - 2013 International Conference on Machine Intelligence Research and Advancement, ICMIRA 2013.

Almaspoor, M. H., Safaei, A., Salajegheh, A., Minaei-Bidgoli, B., & Safaei, A. A. (2021). Support Vector Machines in Big Data Classiication: A Systematic Literature Review Support Vector Machines in Big Data Classification: 1 A Systematic Literature Review 2 3.

Anderson, R., & Mansingh, G. (2014). Data Mining Approach to Decision Support in Social Welfare. International Journal of Business Intelligence Research, 5(2), 39–61.

Balasubramanian, T. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(6), 837–853.

Barca, V. (2017). Integrating data and information management for social protection: (Issue October).

Cao, L. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 42(6), 837–853.

Dadap-Cantal, E. L., Fischer, A. M., & Ramos, C. G. (2021). Targeting versus social protection in cash transfers in the Philippines: Reassessing a celebrated case of social protection. Critical Social Policy, 41(3), 364–384.

Gutiérrez, J. M. (2010). and classifying documents. 280485.

Henman, P., & Adler, M. (2003). Information technology and the governance of social security. Critical Social Policy, 23(2), 139–164.

Javid, T., Gupta, M. K., & Gupta, A. (2022). A hybrid-security model for privacy-enhanced distributed data mining. Journal of King Saud University - Computer and Information Sciences, 34(6), 3602–3614.

Kum, H.-C. (Monica), Duncan, D., Flair, K., & Wang, W. (2003). Social welfare program administration and evaluation and policy analysis using knowledge discovery and data mining (KDD) on administrative data. Dg.o 2003: Proceedings of the 2003 Annual National Conference on Digital Government Research, October 2015, 1–6.

Kumar, A., Agrawal, R., Wankhede, V. A., Sharma, M., & Mulat-weldemeskel, E. (2022). A framework for assessing social acceptability of industry 4.0 technologies for the development of digital manufacturing. Technological Forecasting and Social Change, 174.

Larose, D. T., & Larose, C. D. (2014). DISCOVERING KNOWLEDGE IN DATA An Introduction to Data Mining Second Edition Wiley Series on Methods and Applications in Data Mining. In IEEE Computer Society.

Martinez-Plumed, F., Contreras-Ochando, L., Ferri, C., Hernandez-Orallo, J., Kull, M., Lachiche, N., Ramirez-Quintana, M. J., & Flach, P. (2021). CRISP-DM Twenty Years Later: From Data Mining Processes to Data Science Trajectories. IEEE Transactions on Knowledge and Data Engineering, 33(8), 3048–3061.

Ncr, P. C., Spss, J. C., Ncr, R. K., Spss, T. K., Daimlerchrysler, T. R., Spss, C. S., & Daimlerchrysler, R. W. (2000). Crisp-Dm. SPSS Inc, 78, 1–78.

Nur Adiha, R., Andani, S. R., & Saputra, W. (2021). Application of Data Mining in Determining Social Assistance Recipients With C4.5 Algorithm in Maligas Mountain District. International Journal of Basic and Applied Science, 10(3), 88–99.

OECD. (2019). Social Protection System Review of Indonesia, OECD Development Pathways, OECD.

Park, J. Y., Mistur, E., Kim, D., Mo, Y., & Hoefer, R. (2022). Toward human-centric urban infrastructure: Text mining for social media data to identify the public perception of COVID-19 policy in transportation hubs. Sustainable Cities and Society, 76.

Plotnikova, V., Dumas, M., & Milani, F. P. (2022). Applying the CRISP-DM data mining process in the financial services industry: Elicitation of adaptation requirements. Data and Knowledge Engineering, 139.

Rao, S. (2016). National databases of the poor for social protection. April.

Satish Kumar, A., & Revathy, S. (2022). A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks. Theoretical Computer Science, 927, 15–30.

Saura, J. R., Palacios-Marqués, D., & Ribeiro-Soriano, D. (2021). Using data mining techniques to explore security issues in smart living environments in Twitter. Computer Communications, 179, 285–295.

Surono, A. (2019). Kartu Lansia Jakarta Edisi 2019. Acurat.Co.

TNP2K. (2015). Indonesia ’ s Unified Database for Social Protection Programmes Management Standards. 3–4.

Yaliwal, S., Yaliwal, P., & Mirjankar, N. (2016). Data Mining on Social Security and Social. 35–40.

Zambrano, P., Torres, J., Tello-Oquendo, L., Yánez, Á., & Velásquez, L. (2023). On the modeling of cyber-attacks associated with social engineering: A parental control prototype. Journal of Information Security and Applications, 75.