Fig. 11From: Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computingAverage system utilization time per user requestBack to article page