Fig. 5From: Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computingFlowchart of fuzzy comprehensive evaluationBack to article page