Fig. 13From: Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computingReasons for a mismatch in cyber fraud governance capabilitiesBack to article page