Fig. 3From: Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computingOperation stepsBack to article page