The study on the legal regulation of Internet financial crime holds significant importance in the context of the rapid development of China’s Internet finance and the increasing prevalence of crime in this sector. To prevent crime, attention towards effective control of Internet finance crime has grown, emphasizing the protection of consumers’ rights, reduction of economic damage, and promotion of Internet finance development. Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. The methodology employed in this study is quantitative, focusing on the analysis of Internet financial crime using random forest and association rules based on data processing. The experiment results about the random forest in this paper showed that when the test sample was 600, the actual crime rate and the random forest prediction crime rate were 75.9% and 76.3%, respectively, and when the experimental sample was 600, the actual crime rate and the random forest prediction crime rate were 85.9% and 87.3%, respectively. The experiment results about association rules in this paper showed that with a sample size of 600, the correlation between the test sample and the experimental sample was observed to be 0.92 and 0.97, respectively. The experimental results indicated that the random forest algorithm demonstrated effective prediction abilities, with actual crime rates closely matching the predicted rates in both test and experimental samples. Similarly, association rules showed a strong correlation between the test and experimental samples, further validating the predictive capabilities of the algorithms. The findings underscore the effectiveness of random forest and association rules in predicting Internet financial crime, emphasizing the potential of computer algorithm combinations in crime prediction. The study highlights the importance of applying these algorithms to the legal regulation of Internet financial crime. Further research is proposed to delve deeper into the application of these algorithms in real-world scenarios and explore additional methods to enhance the prevention and management of Internet financial crime.
Abdullah, W. N., & Said, R. (2019). Audit and risk committee in financial crime prevention. Journal of Financial Crime, 26(1), 223-234.
Akdemir, N., & Lawless, C. J. (2020). Exploring the human factor in cyber-enabled and cyber-dependent crime victimization: A lifestyle routine activities approach. Internet Research, 30(6), 1665-1687.
Amjad, R. M. (2022). Non-linear impact of globalization on financial crimes: A case of developing economies. Journal of Money Laundering Control, 25(2), 358-375.
Anisha, D. (2018). Association Rules. GeeksforGeeks. Retrieved July 11, 2023, from www.geeksforgeeks.org/association-rule/.
Brands, J., & van Wilsem, J. (2021). Connected and fearful? Exploring fear of Internet financial crime, Internet behavior and their relationship. European Journal of Criminology, 18(2), 213-234.
DeLiema, M. (2020). Financial fraud among older Americans: Evidence and implications. The Journals of Gerontology: Series B, 75(4), 861-868.
Haqq, A. P. N. A., & Budiwitjaksono, G. S. (2019). Fraud pentagon for detecting financial statement fraud. Journal of Economics, Business, and Accountancy Ventura, 22(3), 319-332.
Hidajat, T. (2020). Unethical practices peer-to-peer lending in Indonesia. Journal of Financial Crime, 27(1), 274-282.
Hu, J., & Szymczak, S. (2023). A review on longitudinal data analysis with random forest. Briefings in Bioinformatics, 24(2), bbad002.
Huang, K. (2021). Decision Tree, Medium. Available at: https://medium.com/%E4%BA%BA%E5%B7%A5%E6%99%BA%E6%85%A7-%E5%80%92%E5%BA%95%E6%9C%89%E5%A4%9A%E6%99%BA%E6%85%A7/decision-tree-%E6%B1%BA%E7%AD%96%E6%A8%B9-%E5%96%AE%E7%B4%94-%E5%BF%AB%E9%80%9F-%E8%A7%A3%E9%87%8B%E6%80%A7%E9%AB%98%E7%9A%84%E6%B1%BA%E7%AD%96%E8%A1%93-ef28e0e75a55 (Accessed: July 11, 2023).
Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77-81.
Liu, X. (2022). Internet Financial Crime Research. Shanghai Ren Min press.
Mugarura, N., & Ssali, E. (2021). Intricacies of anti-money laundering and cyber-crimes regulation in a fluid global system. Journal of Money Laundering Control, 24(1), 10-28.
Nikita, T. (2020). Quantitative Research vs. Qualitative Research: How to Choose? Editage Insights. Retrieved from www.editage.cn/insights/ding-liang-yan-jiu-yu-ding-xing-yan-jiu-ru-he-xuan-ze-5524.
Nindito, M. (2018). Financial statement fraud: Perspective of the Pentagon Fraud model in Indonesia. Academy of Accounting and Financial Studies Journal, 22(3), 1-9.
Reurink, A. (2018). Financial fraud: a literature review. Journal of Economic Surveys, 32(5), 1292-1325.
Song, Y., et al. (2020). An Improved C4.5 Algorithm in Bagging Integration Model. IEEE Access, 8, 206866-206875.
Tang, J., & Karim, K. E. (2019). Financial fraud detection and big data analytics–implications on auditors’ use of fraud brainstorming session. Managerial Auditing Journal, 34(3), 324-337.
Teichmann, F. M. J., & Falker, M. C. (2021). Cryptocurrencies and financial crime: solutions from Liechtenstein. Journal of Money Laundering Control, 24(4), 775-788.
Tsymbal, A., & Puuronen, S. (2000). Bagging and boosting with dynamic integration of classifiers. In Principles of Data Mining and Knowledge Discovery: 4th European Conference, PKDD 2000 Lyon, France, September 13–16, 2000 Proceedings 4 (pp. 116-125). Springer Berlin Heidelberg.
Wronka, C. (2022). Impact of COVID-19 on financial institutions: Navigating the global emerging patterns of financial crime. Journal of Financial Crime, 29(2), 476-490.
Xu, Y., Zhang, L., & Chen, H. (2018). Board age and corporate financial fraud: An interactionist view. Long Range Planning, 51(6), 815-830.
Yang, D. (2018). Internet finance: Its uncertain legal foundations and the role of big data in its development. Emerging Markets Finance and Trade, 54(4), 721-732.
Yin, C. (2022). Association Rules Mining, Frequent Set Mining, and Aporiori. Blog.csdn.net. Retrieved from blog.csdn.net/qq_43391414/article/details/109326990.