{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:42:28Z","timestamp":1761198148037,"version":"build-2065373602"},"reference-count":36,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Universiti Teknologi Brunei (UTB) Internal Grant","award":["UTB Internal Grant 10"],"award-info":[{"award-number":["UTB Internal Grant 10"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Social media is now regarded as the most valuable source of data for trend analysis and innovative business process reengineering preferences. Data made accessible through social media can be utilized for a variety of purposes, such as by an entrepreneur who wants to learn more about the market they intend to enter and uncover their consumers\u2019 requirements before launching their new products or services. Sentiment analysis and text mining of telecommunication businesses via social media posts and comments are the subject of this study. A proposed framework will be utilized as a guideline, and it will be tested for sentiment analysis. Lexicon-based sentiment categorization is used as a model training dataset for a supervised machine learning support vector machine. The result is very promising. The accuracy and the quantity of the true sentiments it can detect are compared. This result signifies the usefulness of text mining and sentiment analysis on social media data, while the use of machine learning classifiers for predicting sentiment orientation provides a useful tool for operations and marketing departments. The availability of large amounts of data in this digitally active society is advantageous for sectors such as the telecommunication industry. These companies can be two steps ahead with their strategy and develop a more cohesive company that can make customers happier and mitigate problems easily with the use of text mining and sentiment analysis for further adopting innovative business process reengineering for service improvements within the telecommunications industry.<\/jats:p>","DOI":"10.3390\/bdcc6040151","type":"journal-article","created":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T02:17:57Z","timestamp":1670465877000},"page":"151","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers\u2019 Service Level Agreement"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1823-357X","authenticated-orcid":false,"given":"Heru","family":"Susanto","sequence":"first","affiliation":[{"name":"Center for Innovative Engineering and School of Business, Universiti Teknologi Brunei, Mukim Gadong A BE1410, Brunei"},{"name":"Center for Research Collaboration of Graph Theory and Combinatory, BRIN-ITB-UTB-UI, National Research and Innovation Agency, Jakarta 10340, Indonesia"}]},{"given":"Aida","family":"Sari","sequence":"additional","affiliation":[{"name":"Center for Innovative Engineering and School of Business, Universiti Teknologi Brunei, Mukim Gadong A BE1410, Brunei"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7746-7800","authenticated-orcid":false,"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[{"name":"Computer Science, Tunghai University, Taichung City 407224, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Afful-Dadzie, E., Nabareseh, S., Oplatkov\u00e1, Z.K., and Kl\u00edmek, P. (2014, January 29\u201331). Enterprise competitive analysis and consumer sentiments on social media: Insights from telecommunication companies. Proceedings of the DATA 2014\u2014Proceedings of 3rd International Conference on Data Management Technologies and Applications, Vienna, Austria.","DOI":"10.5220\/0004991300220032"},{"key":"ref_2","first-page":"1","article-title":"A Text-mining Approach to Evaluate the Importance of Information Systems Research Themes A Text-mining Approach to Evaluate the Importance of Information Systems","volume":"18","author":"Aghakhani","year":"2020","journal-title":"Commun. IIMA"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1016\/j.tele.2017.05.008","article-title":"Social media in marketing: A review and analysis of the existing literature","volume":"34","author":"Alalwan","year":"2017","journal-title":"Telemat. Inform."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"El Rahman, S.A., Alotaibi, F.A., and Alshehri, W.A. (2019, January 3\u20134). Sentiment Analysis of Twitter Data. Proceedings of the 2019 International Conference on Computer and Information Sciences 2019 ICCIS 2019, Aljouf, Saudi Arabia.","DOI":"10.1109\/ICCISci.2019.8716464"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pavaloaia, V.D., Teodor, E.M., Fotache, D., and Danile\u0163, M. (2019). Opinion mining on social media data: Sentiment analysis of user preferences. Sustainability, 11.","DOI":"10.3390\/su11164459"},{"key":"ref_6","first-page":"424","article-title":"Sentiment Analysis Using Deep Learning Techniques: A Review","volume":"8","author":"Tul","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1500000011","article-title":"Opinion Mining and Sentiment Analysis","volume":"Volume 2","author":"Pang","year":"2008","journal-title":"Foundations and Trends in Information Retrieval"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Vieira, S.T., Rosa, R.L., Rodr\u00edguez, D.Z., Ram\u00edrez, M.A., Saadi, M., and Wuttisittikulkij, L. (2021). Q-meter: Quality monitoring system for telecommunication services based on sentiment analysis using deep learning. Sensors, 21.","DOI":"10.3390\/s21051880"},{"key":"ref_9","unstructured":"Barolli, L. Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy. Innovative Mobile and Internet Services in Ubiquitous Computing, Proceedings of the IMIS 2022, Kitakyushu, Japan, 29 June\u20131 July 2022, Springer. Lecture Notes in Networks and Systems."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Heru, S., Leu, F.Y., and Alifya, K.S.S. (2022). Genetics Algorithm Approaches of Cheminformatics Reengineering Process. J. Biomed. Sci., 4.","DOI":"10.38125\/OAJBS.000389"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Setiana, D., Norsarah, S., Besar, N., Anna, T., Nasution, M., and Susanto, H. (2022). Technology Disruption in the Time of the Digital Ecosystem Society\u2019s Adoption: Cyber Bullying Phenomenon\u2014The Truth or Hoax?. Handbook of Research on Big Data, Green Growth, and Technology Disruption in Asian Companies and Societies, IGI Global.","DOI":"10.4018\/978-1-7998-8524-5.ch013"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"74","DOI":"10.5897\/IJPS2016.4587","article-title":"Application of data mining in telecommunication industry","volume":"12","author":"Eze","year":"2017","journal-title":"Int. J. Phys. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.procs.2015.12.159","article-title":"Twitter Sentiment to Analyze Net Brand Reputation of Mobile Phone Providers","volume":"72","author":"Vidya","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_14","unstructured":"Bakar, R.H.A. (2022, July 16). Brunei Targets 5G Rollout by Mid-2022. The Scoop, November 2021. Available online: https:\/\/thescoop.co\/2021\/01\/29\/brunei-targets-5g-rollout-by-mid-2022\/."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Barolli, L. (2022). 5G Base Station Scheduling. Innovative Mobile and Internet Services in Ubiquitous Computing, Proceedings of the IMIS 2022, Kitakyushu, Japan, 29 June\u20131 July 2022, Springer. Lecture Notes in Networks and Systems.","DOI":"10.1007\/978-3-031-08819-3"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Lai, S.T., Susanto, H., and Leu, F.Y. (2021). Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure. International Conference on Broadband and Wireless Computing, Communication and Applications, Springer.","DOI":"10.1007\/978-3-030-90072-4_21"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Barolli, L. (2022). Asymmetric Cryptography among Different 5G Core Networks. Innovative Mobile and Internet Services in Ubiquitous Computing, Proceedings of the IMIS 2022, Kitakyushu, Japan, 29 June\u20131 July 2022, Springer. Lecture Notes in Networks and Systems.","DOI":"10.1007\/978-3-031-08819-3"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yu, P.H., Susanto, H., Liu, L.X., Wu, S.J., and Leu, F.Y. (2021). The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks. International Conference on Broadband and Wireless Computing, Communication and Applications, Springer.","DOI":"10.1007\/978-3-030-90072-4_22"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"72","DOI":"10.20469\/ijhss.5.10004-2","article-title":"Sentiment Analysis Using Text Mining of Indonesia Tourism Reviews via Social Media","volume":"5","author":"Alamanda","year":"2019","journal-title":"Int. J. Humanit. Arts Soc. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Susanto, H., Susanto, A.K.S., and Rifa\u2019ie, M.I. (2022). E-Sports Industry in the Time of Green Digital Ecosystems: Security Decision Support Empowerments. Handbook of Research on Big Data, Green Growth, and Technology Disruption in Asian Companies and Societies, IGI Global.","DOI":"10.4018\/978-1-7998-8524-5.ch006"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Susanto, H., Yie, L.F., Rosiyadi, D., Basuki, A.I., and Setiana, D. (2021). Data security for connected governments and organisations: Managing automation and artificial intelligence. Web 2.0 and Cloud Technologies for Implementing Connected Government, IGI Global.","DOI":"10.4018\/978-1-7998-4570-6.ch011"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"100413","DOI":"10.1016\/j.cosrev.2021.100413","article-title":"A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews","volume":"41","author":"Jain","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2938640","article-title":"Like it or not: A survey of Twitter sentiment analysis methods","volume":"49","author":"Giachanou","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gangrade, S., Shrivastava, N., and Gangrade, J. (2019). Instagram Sentiment Analysis: Opinion Mining. SSRN Electron. J.","DOI":"10.2139\/ssrn.3372757"},{"key":"ref_25","first-page":"975","article-title":"Sentiment Analysis and Text Mining for Social Media Microblogs using Open-Source Tools: An Empirical Study Spatial and Temporal Environment Impact Analysis on People\u2019s Wellbeing View project Big data streaming for disease prediction in Real-time using mac","volume":"112","author":"Younis","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alamsyah, A., Paryasto, M., Putra, F.J., and Himmawan, R. (2016, January 25\u201327). Network text analysis to summarize online conversations for marketing intelligence efforts in telecommunication industry. Proceedings of the 2016 4th International Conference on Information and Communication Technology, ICoICT2016, Bandung, Indonesia.","DOI":"10.1109\/ICoICT.2016.7571889"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Najadat, H., Al-Abdi, A., and Sayaheen, Y. (2018, January 3\u20135). Model-based sentiment analysis of customer satisfaction for the Jordanian telecommunication companies. Proceedings of the 2018 9th International Conference on Information and Communication Systems, ICICS 2018, Irbid, Jordan.","DOI":"10.1109\/IACS.2018.8355429"},{"key":"ref_28","first-page":"395","article-title":"Sentiment Classification of Twitter Data Belonging to Saudi Arabian Telecommunication Companies","volume":"8","author":"Qamar","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1016\/j.procs.2018.04.117","article-title":"Social media metrics and sentiment analysis to evaluate the effectiveness of social media posts","volume":"130","author":"Poecze","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ibrahim, F., Hussin, M.S., Susanto, H., and Abdullah, N. (2022). Enterprise social media as knowledge management system in higher education institutions (HEIs). Digital Transformation Management, Routledge.","DOI":"10.4324\/9781003224532-8"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mohiddin, F., Jumat, M.K., Susanto, H., Ibrahim, F., Setiana, D., Rosiyadi, D., and Susanto, A.K.S. (2022). Implication of knowledge management systems adoptions: Higher education institutions context. Digitalisation and Organisation Design, Routledge.","DOI":"10.4324\/9781003163824-13"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Susanto, H. (2021). Revealing Cyber Threat of Smart Mobile Devices within Digital Ecosystem: User Information Security Awareness. Data Integrity and Quality, IntechOpen.","DOI":"10.5772\/intechopen.95752"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Susanto, H., and Susanto, A.K.S. (2022). Strengthening artificial intelligence implementation of security business management in time of digital economy innovation. Digitalisation and Organisation Design, Routledge.","DOI":"10.4324\/9781003163824-15"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Susanto, H., Mardhiah, N., and Susanto, A.K.S. (2022). Crafting Strategies of Security Breaches: How Financial Technology Business Models Work in Data-C entric Approaches. FinTech Development for Financial Inclusiveness, IGI Global.","DOI":"10.4018\/978-1-7998-8447-7.ch012"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Susanto, H., Ibrahim, F., Rosiyadi, D., Setiana, D., Susanto, A.K.S., Kusuma, N., and Setiawan, I. (2022). Securing Financial Inclusiveness Adoption of Blockchain FinTech Compliance. FinTech Development for Financial Inclusiveness, IGI Global.","DOI":"10.4018\/978-1-7998-8447-7.ch010"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Susanto, H., Mohiddin, F., Fang-Yie, L., Sanip, M.S., Susanto, A.K.S., Setiana, D., Rosiyadi, D., Rosiyadi, D., Ibrahim, F., and Insani, A. (2022). Business Process Reengineering of Digital Learning Ecosystems: Green Strategy for Recovery and Sustainability. Handbook of Research on Green, Circular, and Digital Economies as Tools for Recovery and Sustainability, IGI Global.","DOI":"10.4018\/978-1-7998-9664-7.ch007"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/6\/4\/151\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:36:11Z","timestamp":1760146571000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/6\/4\/151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":36,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["bdcc6040151"],"URL":"https:\/\/doi.org\/10.3390\/bdcc6040151","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2022,12,8]]}}}