0% found this document useful (0 votes)
26 views12 pages

Artikel Mobile App For Detection Pornography

Uploaded by

raditya1122
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views12 pages

Artikel Mobile App For Detection Pornography

Uploaded by

raditya1122
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)

Volume XX, Issue XX, Month 20XX

MOBILE APPLICATIONS FOR SELF-HANDLE


OF PORNOGRAPHY ADDICTION
Raditya Muhammad1*, Mochamad Iqbal Ardimansyah2, Yona Wahyuningsih3
1,2Departmentof Software Engineering, Kampus UPI Cibiru, Universitas Pendidikan Indonesia, Bandung,
Indonesia
3Department of Primary School Teacher Education, Kampus UPI Cibiru, Universitas Pendidikan

Indonesia, Bandung, Indonesia

[email protected]*, [email protected],[email protected]

Abstract
Content with pornographic nuances in the form of images, sound, and videos is widely circulating on the
internet, including on social media. Teenagers have great potential to become addicted to pornographic
content given the widespread use of the internet among adolescents. Pornography addiction has the
potential to interfere with the physical and mental development of addicts, even a wider impact can lead to
criminal cases in society, such as rape. This paper discusses the development of mobile applications that
aim to help pornographic content addicts get rid of pornography addiction problems. The applications
developed include a system for assessing the level of exposure to pornographic content, handling and self-
care of pornographic content, and a system for detecting the user's location in solitude. The rating system
was adapted from the Pornography Addiction Screening Tool (PAST). Handling and self-care pornographic
content use the psychological approach of Cognitive Behavioral Therapy (CBT) which has been widely
researched and used as a method for mental treatment and healing. An assessment system for the level
of exposure to pornographic content and self-care is presented in the application by utilizing chatbot to
increase the interactive between the user and the application. The research method uses the Design
Research Methodology (DRM) while the method in developing mobile applications uses Agile models as
an adaptive software development method. This application is not intended to replace the role of
psychologists, but as a supporting tool that can help pornography addicts to reduce their addiction level
until they recover. Through black box testing, evaluation results from a functional perspective show that
this application can be used as expected.

Keywords : Addiction, Mobile-app, Pornography

Received: dd-mm-2021 | Revised: dd-mm-2021 | Accepted: dd-mm-2021


DOI: https://doi.org/10.23887/janapati.v10i1.xxx

INTRODUCTION of 115 million times, the number of visits to the


The term porn is an abbreviation of site increased by 24% during the Covid-19
pornography which is defined as a medium in the pandemic [18]. Even more worrying,
form of text, visuals, audio, and audio visual pornographic content can easily be found on
which is deliberately produced amateurly and social media. Explicitly or implicitly easy to find in
professionally with the aim of stimulating the the form of images, videos, even user behavior
sexual desires of its viewers [1-6], forms of through challenges on social media, such as:
pornography generally describe various sexual Twitter, TikTok, Facebook, and so on [19-27].
activities, such as: masturbation, oral sex, anal The tendency to view pornographic
sex, and the roles between the sexes [7-11]. content has the potential to have a negative
Pornographic content with its various impact. People who are often exposed to
variants is one of the most searched content on pornographic content, whether intentionally or
the internet, this can be seen from searches not, will easily become addicted to pornography
conducted through Google Trends, looking at the [28]. The dangers arising from pornography
pattern of users using the keyword "porn" in the addiction can make sudden and coercive
last 5 years shows that a high level of interest behavioral impulses tend to lead to elements of
from users worldwide [12-17]. Furthermore, sexuality [29]. When this urge cannot be
according to a report on an adult site in 2019 it restrained, the impact of pornography addiction
reached 2 billion visits, with an average daily visit can not only affect the perpetrators, but can also

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 1


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

have a negative impact on society. Addiction to as therapy using CBT in the MoodGym web
pornography is the beginning of deviant sexual application [45] and in the form of a mobile
behavior, pedophilia, and rape cases [30]. application [46-48]. However, the targets of the
With easy access to pornographic two CBT studies did not specifically address
content, children and adolescents are the subject pornography addiction but rather mental
with the greatest potential for harm from disorders in general.
pornography, given the high use of mobile Towards pornographic content has the
phones and the internet among adolescents [31]. opportunity to inhibit optimal body development
So that the opportunities for children and because pornography can weaken brain function
adolescents to become pornography addicts are [34-35]. As a result, pornography addicts' ability
greater. Several studies have shown us that to learn and understand something decreases
many children at school age are exposed to [49]. Addiction to pornography has the potential
pornographic content through various media, to cause shame, feelings of guilt, and feelings of
including social media, as shown in research by being unable to control oneself, making it difficult
shows worrying findings [19-25,32-33]. This is to carry out positive activities, triggering
because at that time human development, both depression and anxiety, as well as a tendency
physiologically and biologically, was developing not to be attached to the social environment [37-
very rapidly [ 28—30, 40]. 40].
Addiction to pornographic content has From the various efforts and research in
the opportunity to hinder optimal body dealing with pornography, there is still no
development because pornography can weaken evidence of handling efforts that involve the use
brain function [34-35]. As a result, pornography of technology combined with psychological
addicts' ability to learn and understand methods specifically to address the problem of
something decreases [36]. Addiction to pornography addiction. This article is a
pornography has the potential to cause shame, continuation of the work we have done previously
feelings of guilt, and feelings of being unable to [50] with the addition of aspects of self-handling
control oneself, making it difficult to carry out and efforts to limit the perpetrator's environment.
positive activities, triggering depression and So in this article we discuss how we develop a
anxiety, as well as a tendency not to be attached self-detection and handling system in the form of
to the social environment [37-40]. a mobile application. We hope that from this
Several attempts have been made to article more and more parties will become aware
overcome pornography addiction, starting from that pornography is dangerous and help
detecting symptoms of pornography addiction pornography addicts to reduce their addiction
through a series of tests for several weeks [40], level until they are cured.
then considering the relationship between
pornography addiction and depression and METHOD
anxiety, which are forms of mental disorders, The method used as a research
treatment methods and mental healing through framework was carried out using the Design
therapy can be carried out using the Cognitive Research Methodology (DRM) method initiated
[37-40] [51]. The DRM method is a research
Technological interventions are carried methodology for systematically developing and
out such as limiting user access to pornography validating knowledge in engineering design
through blocking the web and pornographic research. DRM consists of research clarification,
content [41-42] and strengthened by increasing descriptive study 1, prescriptive study, and
the accuracy of the model to detect content descriptive study 2. The method described in
containing pornography [43-44]. Other efforts are Figure 1 emphasizes a research framework that
made by increasing awareness of addicts to be supports a more accurate approach in the
able to recover from pornography addiction, such planning carried out.

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 2


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Figure 1. Research Design

In the research clarification stage, the module from CBT, and design of a system to
main consideration is how to find the factors that prevent users from being isolated in the
support the success of the research being carried environment.
out. In this case, it is important to understand the The results at the prescriptive study
basic concepts of pornography, its potential stage need to evaluate the results of its
dangers, threats from pornography, prevention application which is carried out at the descriptive
efforts, technology to support prevention efforts study stage 2. The evaluation stage is the
which are carried out through literature studies application testing process in the application
from various sources. At this stage also developer environment to see application
determined how the measurement mechanism. performance and error-free before it is used by
We use the Pornography Addiction Screening the user. Evaluation is carried out to measure the
Tool developed by the Youth Pornography functional aspects of the designs that have been
Addiction Center to determine the level of previously designed.
addiction resulting from exposure to To strengthen the implementation of the
pornographic content. DRM research method, especially at the
Based on the results of the literature prescriptive study stage and descriptive study 2
study we found several problems, then the where the output resulting from this research is a
definition of the problem became an output at the software, we need a framework in software
Descriptive Study stage 1. The definition of the development that has been tested and is
problem that we identified was: how to model the adaptive. The software development model that
right chatbot system design to meet the needs of we use in this study is the Agile model as
early detection of pornography addiction cases, depicted in Figure 2.
how to develop a design model for handling early The research begins with the planning
pornography addiction into the system, and how stage, the process carried out, namely: setting
the developed system can help its users know the scope and identifying and analyzing problems
the level of exposure and self-management to get of pornography addiction, as well as identifying
rid of pornography addiction. opportunities and threats in system development.
In the prescriptive study stage, it is The process of studying literature from journal
carried out to develop methods that can realize articles, conferences, and reports from various
the desired situation. In this case the stages of research institutions is taken as secondary data.
application development were carried out which Next, an analysis of the required system
included application interface design, requirements is carried out from the initial stage
implementation of a chatbot-based detection to the final stage. Finally, planning a series of
system based on PAST, implementation of self- activity schedules and a mechanism for
handling through the development of a mood monitoring the system work process.
identification feature based on the feelings

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 3


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Figure 2. Software Development Method Based on Agile Model

The next stage is Design. Activities observe the execution of the application when
carried out are deepening the material as a basis carrying out previously designed functionality.
for developing application logic, planning At the Deploy Stage, the application is
features/tasks in the chatbot application. We then implemented to users, at this stage evaluation is
translate the basic logic into flowcharts and use still being carried out. The results of this
cases. The system design is then described in evaluation will become improvements and spark
the form of an application wireframe. new sprints. The principle at this stage is to
Furthermore, the system design validation develop the application again based on the
process is carried out in the application developer feedback provided by the user so that the system
environment, before later being tested on can continue to run and develop according to its
psychologists and prospective users. function.
Prospective users are assumed to have
characteristics close to the main target of RESULT AND DISCUSSION
application users. The output of this process is The results section describes the results
application prototyping. obtained following the DRM research design
Furthermore, the Develop stage is the scheme and Agile Model software development
process of implementing the system design into methods. The planning stages have been
lines of code. At this stage coding the program explained in detail in the Introduction Section and
includes the application interface, database the Methodology Section. The following
structure, to the authentication mechanism. discussion will focus on the Design Stages,
Database settings, such as: context recognition Develop Stages, Test Stages, and Deploy
based on keywords and their responses, then the Stages. Detailed explanation of each stage will
output of the detection results based on PAST, to be explained in the following paragraphs.
recording user data for user authentication needs
into the system. In this article, the implementation System Design
process includes a self-detection and treatment The system built is in the form of a mobile
system through recording the user's mood which application on the Android platform (minimum
is the basis for recommendations for diverting version of Android 5.0). There are two main
desire to open pornographic content. features developed, namely: a pornography
The test phase is carried out with the aim addiction detection system built on the
of validating the accuracy between the design measurement technique of the Pornography
and development stages so that the application Addiction Screening Tool (PAST) as well as a
is ensured to be free of bugs. In this article, the self-handling system based on CBT and addict
stages of testing are carried out in the detection in isolated locations. There are two
developer's environment for processes in the entities involved in this detection system, namely:
detection and self-handling system through the user and the application system. The system
mood recording. The mechanism for testing the workflow can be seen in Figure 3.
system uses the Black-box testing method to

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 4


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Figure 3. Flow Chart of the Developed System

In application systems, databases are using a use case diagram. Actors are entities
a crucial component to develop. In Figure 3 it that receive or provide information from a
can be seen that the database supports various system. Actors in the built system are target
activities. The database used in the application users, namely pornography addicts aged 12-30
uses two mechanisms, namely: a cloud-based years and chatbot applications. The language
database and a database built locally on the used in the system is Indonesian, chatbot
user's device. The recommendations that come technology is developed by taking into account
out of this application do not necessarily context and responses with a language style
become the main reference for treatment, the adapted to the target user. The developed
recommendations of psychologists are still system consists of 5 events in the two actors
prioritized. shown in Figure 4.
Furthermore, the interaction between
the user and the application is represented

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 5


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Figure 4. Use Case Diagram of the System Developed

Application Development
Implementation is carried out based on In addition, after login the application detects
the results and evaluation of the system design. the username and it will be used as greeting
Evaluation at the design stage is carried out to and greeting in the message displayed in the
increase user convenience. One of them is chatbot.
evaluating the implementation of chatbots, the Next, the user will be directed to
system will identify keywords from messages answer several questions that are used as a
entered by users. However, based on the test instrument for detecting pornography
results of user experience analysis, the number exposure levels. To make it easier for users, an
of questions during the screening process for answer button feature is provided so that users
pornography addiction has the potential to don't have to be tired of typing answers to
cause users to get tired of answering questions. There are 25 questions asked and
questionnaire questions, so a button feature there are five answer choices for users to
was created to help users choose answer choose from which best describe their
options. condition. Each answer choice has a weight
A login mechanism is made to check that will be calculated by the system so that it
the user's progress, if the user is a new user can decide the user's level of exposure to
then he will be directed to take part in a pornography. The application also provides a
screening to assess the level of exposure to progress bar, so users can measure the
pornography he has experienced, whereas if number of questions answered.
the user is an old user then the application will
display the progress that the user has achieved.

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 6


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Figure 5. Display of Detection System in Chatbot

The Pornography Addiction Screening the one that best describes their condition.
Tool (PAST) can be used as an early stage Each answer choice has a weight that will be
assessment tool by individuals who have a calculated by the system so that it can decide
perception of experiencing pornography the user's level of exposure to pornography [52-
addiction in themselves. PAST is an 53]. Based on PAST, a person's exposure level
assessment rubric consisting of 25 questions related to pornographic content is explained in
and there are five answer choices from 0 the following table.
(never) to 4 (often) and then the user chooses

Table 1. PAST-Based Pornography Exposure Rating System

Score Addiction Level Description


0 – 25 Normal Normal sexual curiosity
26 – 49 Involvement with Vulnerable to the possibility of
pornography addiction
50 – 69 Pornography addiction Hypersexual behavior is visible
emerges
70 – 100 Porn addiction Can't get away from pornography

Table 1 forms the basis for the early- application developed by the Australian
stage assessment mechanism for pornography National University as an independent therapy
addicts. This assessment is carried out application that can help prevent and manage
interactively to provoke the motivation of symptoms of depression and anxiety from its
individuals who have perceptions of users (Moodgym CBT Training Program). The
pornography addiction, but with the steps we take from the therapy stage are to
consideration of maintaining the privacy of its record and respond to the mood/mood of users
users. On this basis, the chatbot system was who are detected as addicted to pornography.
chosen because it is able to accommodate There are several mood conditions that we
these problems. record, ranging from: happy, sad, angry, bored,
In developing the application at the scared, and so on [54-55].
treatment stage, we refer to 'moodgym' which is
a research product in the form of a web-based

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 7


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Figure 6. Handling Based on User's Mood

From the mood conveyed by the user, the designed functionality and overall the
application will save then calculate and provide application's core features such as features for
recommendations for what activities the user detecting and handling users who have
needs to do as a distraction to open received pornography addiction detection
pornographic content. status.

Test Scenarios Result Test


All applications are developed in their Black box testing is testing in terms of functional
entirety through an application testing process specifications without testing the design and
in the application developer environment to see program code to find out whether the functions,
application performance and are free from input and output of the software comply with the
errors before being used by users. Testing is required specifications [56]. Table 2 is the test
carried out using the blackbox testing method. results that have been carried out done by the
The test scenario carried out is to observe the developer.
application execution when carrying out the

Table 2. Result of blackbox test

Test Scenarios Test Cases Expected Results Actual Results


Register Register via a valid Can register via a valid According to the scenario,
email account account. successfully registered via
a valid account from Gmail.
Registration using Cannot register via an According to the scenario,
invalid email invalid email account you cannot register and a
notification appears
Register using your Cannot register via an According to the scenario,
registered email already registered email you cannot register and a
account notification appears
Sign-In Sign-in with a valid email You can sign in and enter According to the scenario,
account and password the introduction menu successfully sign-in and
enter the introduction menu
Sign-in with an invalid Unable to sign-in, user re- According to the scenario,
email account and enters account unable to log in, the user
password re-enters the account.
Interaction Question interaction Bots can carry out question According to the scenario,
Features answer with and answer interactions with Bots can carry out question
bots users.

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 8


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

and answer interactions


with users.
Screening Screening through 25 For every question According to the scenario,
detection questions with 5 answer answered, the chatbot for each question
addicted options, 4. provides a different answered, the chatbot
pornography response for each option. provides a different
response for each option.

Screening results Appear According to the scenario


notification that appears
in the form of value notification
screening and in the form of value
level screening and
his addiction level
his addiction
Daily check in Choose your daily The mood feature has been According to the scenario,
mood. successfully set and the the mood feature is
mood data is saved in the successfully set and the
application. mood data is saved in the
application.
Dashboards View status Through the dashboard According to the scenario,
daily activity and register menu, users can see their through the dashboard
daily activities daily activities. menu users can see their
user. daily activities.
Scheduling Add Activities can be added and According to the scenario,
activities in the viewed in the scheduling activities
scheduling menu menu. succeed
added and seen in the
scheduler menu.
Add Activities cannot be added According to the scenario,
activities that and a notification appears activities cannot be added
collide that there are activities at and a notification appears
with a schedule that time that there are activities at
other activities that time.
Activity Activities are analyzed Activities are possible According to the scenario,
Scheduling with and categorized by AI categorized as activities Activities are
(Artificial by AI possible
Intelligence) categorized as
features. by AI.
Chatbots with AI Ask Chatbots always provide According to the scenario,
(Artificial something or feedback based AI. Chatbots always provide
Intelligence) vent feedback based AI.
feattures. on chatbots
Change theme Set to dark or light The application theme can According to the scenario,
theme be changed to the application theme can
dark or light theme be changed to
dark or light theme.
Edit profile Edit Profile data Profile data can be edited. According to the scenario,
the profile data can be
edited.

The table above explains the application CONCLUSION


testing process through the features that run The development of chatbot-based
when the application is used. From the tests that mobile applications as a system for detecting and
have been carried out, the results obtained are treating pornography addiction is a solution to
that all features can work according to the difficulties in detecting and treating victims of
expected results. pornography addiction. This application is
interactive but still makes users feel comfortable

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 9


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

because their privacy is guaranteed. The [9] Fritz, N., Malic, V., Fu, T. C., Paul, B., Zhou,
application has been functionally tested to be Y., Dodge, B., ... & Herbenick, D. (2022).
able to detect levels of exposure to pornography Porn sex versus real sex: sexual behaviors
and record mood conditions and then direct users reported by a US probability survey
to divert their desire to open pornographic compared to depictions of sex in mainstream
content to other, more positive activities. This internet-based male–female
application is not intended to replace the role of pornography. Archives of Sexual
psychologists, but as a supporting tool that can behavior, 51(2), 1187-1200.
help pornography addicts to reduce their [10] Herbenick, D., Fu, T. C., Wright, P., Paul, B.,
addiction level until they recover. Gradus, R., Bauer, J., & Jones, R. (2020).
Diverse sexual behaviors and pornography
REFERENCES use: Findings from a nationally
[1] Magaldi, J. A., Sales, J. S., & Paul, J. (2020). representative probability survey of
Revenge porn: The name doesn't do Americans aged 18 to 60 years. The Journal
nonconsensual pornography justice and the of Sexual Medicine, 17(4), 623-633.
remedies don't offer the victims enough [11] Solano, I., Eaton, N. R., & O’Leary, K. D.
justice. Or. L. Rev., 98, 197. (2018). Pornography consumption, modality
[2] Fernandez, D. P., Kuss, D. J., & Griffiths, M. and function in a large internet sample. The
D. (2021). The pornography “rebooting” Journal of Sex Research.
experience: A qualitative analysis of [12] Agarwal, V., & Sastry, N. (2022, April). “Way
abstinence journals on an online back then”: A Data-driven View of 25+ years
pornography abstinence forum. Archives of of Web Evolution. In Proceedings of the ACM
Sexual Behavior, 50, 711-728. Web Conference 2022 (pp. 3471-3479).
[3] Vera-Gray, F., McGlynn, C., Kureshi, I., & [13] Birhane, A., Prabhu, V. U., & Kahembwe, E.
Butterby, K. (2021). Sexual violence as a (2021). Multimodal datasets: misogyny,
sexual script in mainstream online pornography, and malignant
pornography. The British Journal of stereotypes. arXiv preprint
Criminology, 61(5), 1243-1260. arXiv:2110.01963.
[4] Jacobs, T., Geysemans, B., Van Hal, G., [14] Ashton, S., McDonald, K., & Kirkman, M.
Glazemakers, I., Fog-Poulsen, K., (2019). What does ‘pornography’mean in the
Vermandel, A., ... & De Win, G. (2021). digital age? Revisiting a definition for social
Associations between online pornography science researchers. Porn Studies, 6(2),
consumption and sexual dysfunction in 144-168.
young men: multivariate analysis based on [15] Yadav, T. K., Sinha, A., Gosain, D., Sharma,
an international web-based survey. JMIR P. K., & Chakravarty, S. (2018, October).
public health and surveillance, 7(10), Where the light gets in: Analyzing web
e32542. censorship mechanisms in india.
[5] Gupta, R. (2019). Legal Control of In Proceedings of the Internet Measurement
Pornographic Sites and Ethical and Moral Conference 2018 (pp. 252-264).
Issues: A Jurisprudential Analysis. Supremo [16] Jin, Y., Jang, E., Cui, J., Chung, J. W., Lee,
Amicus, 9, 263. Y., & Shin, S. (2023). DarkBERT: A
[6] Planting-Bergloo, S., & Arvola Orlander, A. Language Model for the Dark Side of the
(2022). Challenging ‘the elephant in the Internet. arXiv preprint arXiv:2305.08596.
room’: the becomings of pornography [17] Pandela, T., & Riadi, I. (2020). Browser
education in Swedish secondary school. Sex forensics on web-based tiktok
Education, 1-15. applications. International Journal of
[7] Astle, S., Leonhardt, N., & Willoughby, B. Computer Applications, 175(34), 47-52.
(2020). Home base: Family of origin factors [18] Mestre-Bach, G., Blycker, G. R., & Potenza,
and the debut of vaginal sex, anal sex, oral M. N. (2020). Pornography use in the setting
sex, masturbation, and pornography use in a of the COVID-19 pandemic. Journal of
national sample of adolescents. The Journal Behavioral Addictions, 9(2), 181–183.
of Sex Research, 57(9), 1089-1099. https://doi.org/10.1556/2006.2020.00015
[8] Pirrone, D., Zondervan-Zwijnenburg, M., [19] Vitorino, P., Avila, S., Perez, M., & Rocha, A.
Reitz, E., van den Eijnden, R. J., & Ter Bogt, (2018). Leveraging deep neural networks to
T. F. (2022). Pornography use profiles and fight child pornography in the age of social
the emergence of sexual behaviors in media. Journal of Visual Communication and
adolescence. Archives of Sexual Behavior, Image Representation, 50, 303-313.
1-16. [20] Izzah, N., Budi, I., & Louvan, S. (2018, May).
Classification of pornographic content on

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 10


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

Twitter using support vector machine and 2022. Hootsuite.


Naive Bayes. In 2018 4th International [32] Fibrila, F., Fairus, M., Raifah, H., &
Conference on Computer and Technology Tanjungkarang, K. (2021). Exposure to
Applications (ICCTA) (pp. 156-160). IEEE. Pornography through Social Media on
[21] Byron, P., McKee, A., Watson, A., Litsou, K., Sexual Behavior of High School Teenagers
& Ingham, R. (2021). Reading for realness: in Metro City. 9(6), 1–08.
Porn literacies, digital media, and young https://doi.org/10.9790/1959-0906040108
people. Sexuality & Culture, 25, 786-805. [33] Maisya, I. B., & Masitoh, S. (2020). Derajat
[22] Thurman, N., & Obster, F. (2021). The Keterpaparan Konten Pornografi Pada
regulation of internet pornography: What a Siswa SMP Dan SMA Di DKI Jakarta Dan
survey of under‐18s tells us about the Banten Indonesia. Jurnal Kesehatan
necessity for and potential efficacy of Reproduksi, 10(2), 117–126.
emerging legislative approaches. Policy & https://doi.org/10.22435/kespro.v10i2.2463
Internet, 13(3), 415-432. [34] Hafiar, H., Lukman, S., Syuderajat, F.,
[23] Pezzutto, S. (2019). From porn performer to Prastowo, F. A. A., Priyatna, C. C., & Sjafirah,
porntropreneur: Online entrepreneurship, N. A. (2019). Anticipating the Impact of
social media branding, and selfhood in Pornography through Dissemination of
contemporary trans pornography. AG About Negative Content. Jurnal Ilmu
Gender-International Journal of Gender Komunikasi, 16(2), 259-274.
Studies, 8(16). [35] Fernandez, D. P., Kuss, D. J., & Griffiths, M.
[24] Hartono, D. J. (2022). The Criminal D. (2021). The pornography “rebooting”
Responsibility for Pornography Video Maker experience: A qualitative analysis of
Through Digital Forensics on Social abstinence journals on an online
Media. YURIS (Journal of Court and Justice), pornography abstinence forum. Archives of
50-57. Sexual Behavior, 50, 711-728.
[25] Wang, Y. (2021). The twink next door, who [36] Razi, N. I. M., Rahman, A. W. A., &
also does porn: Networked intimacy in gay Kamaruddin, N. (2018). Neurophysiological
porn performers’ self-presentation on social Analysis of Porn Addiction to Learning
media. Porn Studies, 8(2), 224-238. Disabilities. 2018 International Conference
[26] Arikewuyo, A., Ozad, B., & Lasisi, T. T. on Information and Communication
(2019). Erotic use of social media Technology for the Muslim World (ICT4M),
pornography in gratifying romantic 272–277.
relationship desires. The Spanish Journal of https://doi.org/10.1109/ICT4M.2018.00057
Psychology, 22, E61. [37] Camilleri, C., Perry, J., & Sammut, S. (2021).
[27] Mugari, I. (2020). The dark side of social Compulsive Internet Pornography Use and
media in Zimbabwe: Unpacking the legal Mental Health: A Cross-Sectional Study in a
framework conundrum. Cogent Social Sample of University Students in the United
Sciences, 6(1), 1825058. States. Frontiers in Psychology, 11, 613244.
[28] Lewczuk, K., Lesniak, J., Lew-Starowicz, M., [38] Borgogna, N. C., Duncan, J., & McDermott,
& Gola, M. (2021). Variability of R. C. (2018). Is scrupulosity behind the
Pornographic Content Consumed and relationship between problematic
Longest Session of Pornography Use pornography viewing and depression,
Associated With Treatment Seeking and anxiety, and stress?. Sexual Addiction &
Problematic Sexual Behavior Symptoms. Compulsivity, 25(4), 293-318.
Sexual Medicine, 9(1), 100276. [39] Kraus, S. W., & Sweeney, P. J. (2019). Hitting
https://doi.org/10.1016/j.esxm.2020.10.004 the target: Considerations for differential
[29] Kamińska, A. G. (2022). “Problematic” diagnosis when treating individuals for
Sexual Behaviors: Clinical and Legal problematic use of pornography. Archives of
Aspects. The Person and the Challenges. Sexual Behavior, 48, 431-435.
The Journal of Theology, Education, Canon [40] Setyawati, R., Hartini, N., & Suryanto, S.
Law and Social Studies Inspired by Pope (2020). The psychological impacts of internet
John Paul II, 12(1), 237-257. pornography addiction on
[30] Aral, A., Say, G. N., & Usta, M. B. (2018). adolescents. Humaniora, 11(3), 235-244.
Distinguishing circumscribed behavior in an [41] Irawan, N. O., Nurfadila, P. D., Ristanti, P. Y.,
adolescent with Asperger syndrome from a & Hammad, J. A. H. (2019). Blocking
pedophilic act: a case report. Dusunen Adam pornography sites on the internet private and
The Journal of Psychiatry and Neurological university access. Bulletin of Social
Sciences, 31(1), 102. Informatics Theory and Application, 3(1),
[31] Hootsuite. (2022). Indonesian Digital Report Article 1.

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 11


ISSN 2089-8673 (Print) | ISSN 2548-4265 (Online)
Volume XX, Issue XX, Month 20XX

https://doi.org/10.31763/businta.v3i1.161 Kabupaten Badung. Jurnal Nasional


[42] Jin, L., Hao, S., Wang, H., & Cotton, C. Pendidikan Teknik Informatika:
(2021). Understanding the Impact of JANAPATI, 8(3), 197-207.
Encrypted DNS on Internet Censorship. [49] Razi, N. I. M., Rahman, A. W. A., &
Proceedings of the Web Conference 2021, Kamaruddin, N. (2018). Neurophysiological
484–495. Analysis of Porn Addiction to Learning
https://doi.org/10.1145/3442381.3450084 Disabilities. 2018 International Conference
[43] Song, K., & Kim, Y.-S. (2020). An Enhanced on Information and Communication
Multimodal Stacking Scheme for Online Technology for the Muslim World (ICT4M),
Pornographic Content Detection. Applied 272–277.
Sciences, 10(8), Article 8. https://doi.org/10.1109/ICT4M.2018.00057
https://doi.org/10.3390/app10082943 [50] Muhammad, R., & Ardimansyah, M. I.
[44] He, G., Kang, Y., Gao, Z., Jiang, Z., Sun, C., (2022). Sistem Deteksi Kecanduan
Liu, X., Lu, W., Zhang, Q., & Si, L. (2019). Pornografi Berbasis Chatbot Menggunakan
Finding Camouflaged Needle in a Haystack? Pornography Addiction Screening Tool
Pornographic Products Detection via (PAST). Building of Informatics, Technology
Berrypicking Tree Model. Proceedings of the and Science (BITS), 4(3), Article 3.
42nd International ACM SIGIR Conference https://doi.org/10.47065/bits.v4i3.2660
on Research and Development in [51] Sharma, M., Joshi, S., & Kumar, A. (2020).
Information Retrieval, 365–374. Assessing enablers of e-waste management
https://doi.org/10.1145/3331184.3331197 in circular economy using DEMATEL
[45] Dorow, M., Stein, J., Förster, F., Löbner, M., method: An Indian
Franz, M., Günther, R., Schröder, R., perspective. Environmental Science and
Sommer, D., Möller, D., Dekoj, M. C., Pollution Research, 27(12), 13325-13338.
Becker, T., & Riedel-Heller, S. G. (2018). [52] Hilton, D. L. (2021). Pornography and the
[Implementation of the Internet-Based Self- developing brain: Protecting the
Management Program “moodgym” in children. Online child sexual exploitation:
Patients with Depressive Disorders in Treatment and prevention of abuse in a
Inpatient Clinical Settings—Patient and digital World, 49-56.
Expert Perspectives]. Psychiatrische Praxis, [53] Joshi, S., & Jain, N. (2022). Effect Of
45(5), 256–262. https://doi.org/10.1055/s- Pornography On Youth And Its Impact: A
0043-117049 Jurisprudential Study Running Title:-Effect Of
[46] Arhandi, P. P., Firdausi, A. T., Lestari, V. A., Pornography OnYouth. International Journal
Muhasibi, A., Putra, D. Y. E., & Andoko, B. S. of Early Childhood Special Education, 14(6).
(2023). Application of Construct on Scaffold [54] Blachly, M., & Dean, N. (2019). Feelings
Concept Map in Mobile Programming charts instead of behavior charts: Radical
Learning with Flutter Layout Topic. Jurnal love instead of shame.
Nasional Pendidikan Teknik Informatika: [55] Schenetti, M., & Guerra, E. (2018). Emotion
JANAPATI, 12(2). map making. Discovering teachers’
[47] Nirmala, B. M. S., & Liandana, M. (2017). relationships with nature. Asia-Pacific journal
Analisis Usabilitas Pada Aplikasi Mobile Trip of research in early childhood
Planner Etourism Pariwisata Di Bali. Jurnal education, 12(2), 31-56.
Nasional Pendidikan Teknik Informatika: [56] W. N. Cholifah, Yulianingsih, dan S. M.
JANAPATI, 6(3), 243-255. Sagita, “Pengujian Black Box Testing
[48] Raharja, I. G. W., Arthana, I. K. R., Pada Aplikasi Action & Strategy
Darmawiguna, I. G. M., & Sindu, I. G. P. Berbasis Android Dengan Teknologi
(2019). Pengembangan Sistem Informasi Phonegap,”J. String, vol. 3, no. 2, hal. 206–
Juru Pemantau Jentik Berbasis Mobile Di 210, 2018.

Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI | 12

You might also like