Skip to main content

Advances, Systems and Applications

Table 3 Comparison of the values of \(TO\)

From: Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing

Order n

TO

2

0.00

3

0.59

4

0.90

5

1.13

6

1.25

7

1.33

8

1.42

9

1.46

10

1.50