{"id":"https://openalex.org/W4366825916","doi":"https://doi.org/10.1186/s13677-023-00437-3","title":"Criminal law regulation of cyber fraud crimes\u2014from the perspective of citizens\u2019 personal information protection in the era of edge computing","display_name":"Criminal law regulation of cyber fraud crimes\u2014from the perspective of citizens\u2019 personal information protection in the era of edge computing","publication_year":2023,"publication_date":"2023-04-24","ids":{"openalex":"https://openalex.org/W4366825916","doi":"https://doi.org/10.1186/s13677-023-00437-3","pmid":"https://pubmed.ncbi.nlm.nih.gov/37122827"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00437-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00437-3","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00437-3","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00437-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100433693","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0003-1202-626X"},"institutions":[{"id":"https://openalex.org/I158934434","display_name":"Zhongnan University of Economics and Law","ror":"https://ror.org/04yqxxq63","country_code":"CN","type":"education","lineage":["https://openalex.org/I158934434"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Criminal Justice School, Zhongnan University of Economics and Law, Wuhan, 430073 China","Criminal Justice School, Zhongnan University of Economics and Law, Wuhan, 430073, China"],"affiliations":[{"raw_affiliation_string":"Criminal Justice School, Zhongnan University of Economics and Law, Wuhan, 430073 China","institution_ids":["https://openalex.org/I158934434"]},{"raw_affiliation_string":"Criminal Justice School, Zhongnan University of Economics and Law, Wuhan, 430073, China","institution_ids":["https://openalex.org/I158934434"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043060987","display_name":"Haoyun Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyun Dong","raw_affiliation_strings":["School of Criminology, People's Public Security University of China, Beijing, 100038 China","School of Criminology, People's Public Security University of China, Beijing, 100038, China"],"affiliations":[{"raw_affiliation_string":"School of Criminology, People's Public Security University of China, Beijing, 100038 China","institution_ids":[]},{"raw_affiliation_string":"School of Criminology, People's Public Security University of China, Beijing, 100038, China","institution_ids":["https://openalex.org/I37448385"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043060987","https://openalex.org/A5100433693"],"corresponding_institution_ids":["https://openalex.org/I158934434","https://openalex.org/I37448385"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":6.7121,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.96763034,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"12","issue":"1","first_page":"64","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13475","display_name":"Digital Transformation in Law","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2000","display_name":"General Economics, Econometrics and Finance"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13475","display_name":"Digital Transformation in Law","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2000","display_name":"General Economics, Econometrics and Finance"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14171","display_name":"Education, Law, and Society","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.7709548473358154},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5609160661697388},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5544963479042053},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46755731105804443},{"id":"https://openalex.org/keywords/criminal-law","display_name":"Criminal law","score":0.4459275007247925},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.429252028465271},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4192192554473877},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.41391342878341675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4118180274963379},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4113260805606842},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3976510167121887},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.34965550899505615},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.22133377194404602},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10803836584091187},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.05868992209434509}],"concepts":[{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.7709548473358154},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5609160661697388},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5544963479042053},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46755731105804443},{"id":"https://openalex.org/C202565627","wikidata":"https://www.wikidata.org/wiki/Q146491","display_name":"Criminal law","level":2,"score":0.4459275007247925},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.429252028465271},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4192192554473877},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.41391342878341675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4118180274963379},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4113260805606842},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3976510167121887},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.34965550899505615},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.22133377194404602},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10803836584091187},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.05868992209434509}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s13677-023-00437-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00437-3","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00437-3","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmid:37122827","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/37122827","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of cloud computing (Heidelberg, Germany)","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:10123552","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/10123552","pdf_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC10123552/pdf/13677_2023_Article_437.pdf","source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"J Cloud Comput (Heidelb)","raw_type":"Text"},{"id":"pmh:oai:doaj.org/article:37f29b108f484213a805704d0f075bf5","is_oa":true,"landing_page_url":"https://doaj.org/article/37f29b108f484213a805704d0f075bf5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-17 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00437-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00437-3","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00437-3","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4366825916.pdf"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W2327720464","https://openalex.org/W2331473948","https://openalex.org/W2578377163","https://openalex.org/W2582924769","https://openalex.org/W2607716301","https://openalex.org/W2751461943","https://openalex.org/W2762908724","https://openalex.org/W2769023468","https://openalex.org/W2789620342","https://openalex.org/W2790832404","https://openalex.org/W2803640522","https://openalex.org/W2928275722","https://openalex.org/W2952851282","https://openalex.org/W2955914507","https://openalex.org/W2980498517","https://openalex.org/W3026105097","https://openalex.org/W3063069764","https://openalex.org/W3084953801","https://openalex.org/W3122335539","https://openalex.org/W3157212323","https://openalex.org/W3200727591","https://openalex.org/W4211067533","https://openalex.org/W4226490845","https://openalex.org/W4283785312","https://openalex.org/W4285203714","https://openalex.org/W4296251269","https://openalex.org/W4308433828"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2995938785","https://openalex.org/W2979760315","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4386004629","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Currently,":[0],"cloud":[1,38,101,163,214],"computing":[2,55,164],"provides":[3,56],"users":[4,41],"all":[5,262],"over":[6,137],"the":[7,24,46,52,81,97,104,124,167,179,185,204,211,225,233,254,258,280,286,291,299,305],"globe":[8],"with":[9,96,290],"Information":[10],"and":[11,32,44,64,68,103,139,148,155,166,178,191,193,202,223,250],"Communication":[12],"Technology":[13],"facilities":[14,82],"that":[15,134],"are":[16],"utility-oriented.":[17],"This":[18,145,172],"technology":[19,165],"is":[20,128,140],"trying":[21],"to":[22,42,59,73,87,107,117,230,240,309],"drive":[23],"development":[25],"of":[26,37,51,89,100,123,132,160,181,187,206,213,247,253,263,274,285,301],"data":[27,91],"center":[28],"design":[29],"by":[30,61],"designing":[31],"building":[33],"them":[34,72,161,264],"as":[35],"networks":[36],"machines,":[39],"enabling":[40],"access":[43],"run":[45],"application":[47],"from":[48,184],"any":[49],"part":[50],"globe.":[53],"Cloud":[54],"considerable":[57],"benefits":[58],"organizations":[60],"providing":[62],"rapid":[63],"adaptable":[65],"ICT":[66],"software":[67],"hardware":[69],"systems,":[70],"allowing":[71],"concentrate":[74],"on":[75,142],"creating":[76],"innovative":[77],"business":[78],"values":[79],"for":[80,272],"they":[83],"provide.":[84],"The":[85],"right":[86],"privacy":[88],"big":[90],"has":[92,135],"acquired":[93],"new":[94,130],"definitions":[95],"continued":[98],"advancement":[99],"computing,":[102],"techniques":[105],"available":[106],"protect":[108],"citizens'":[109,188],"personal":[110,175],"information":[111,176,189],"under":[112],"administrative":[113],"law":[114],"have":[115],"managed":[116],"grow":[118],"in":[119,210,244,298],"a":[120,129,157,220],"multitude.":[121],"Because":[122],"foregoing,":[125],"internet":[126,151],"fraud":[127,152,208,294],"type":[131],"crime":[133],"emerged":[136],"time":[138],"based":[141],"network":[143,207],"technology.":[144],"paper":[146,173,199],"analyzed":[147,194,201],"studied":[149,203],"China's":[150],"governance":[153,209],"capabilities,":[154],"made":[156],"comprehensive":[158,221,227],"evaluation":[159,222,228],"using":[162],"Analytic":[168],"Hierarchy":[169],"Process":[170],"(AHP).":[171],"discussed":[174],"security":[177,190],"improvement":[180],"criminal":[182],"responsibility":[183],"perspective":[186],"designed":[192],"cases.":[195],"In":[196],"addition,":[197],"this":[198],"also":[200,217],"ability":[205],"era":[212],"computing.":[215],"It":[216],"carried":[218],"out":[219,232],"used":[224,239],"fuzzy":[226],"method":[229],"carry":[231],"evaluation.":[234],"A":[235],"questionnaire":[236],"survey":[237,241],"was":[238],"100":[242,259],"residents":[243],"district":[245,251],"X":[246],"city":[248],"Z":[249],"Y":[252],"suburban":[255],"area.":[256],"Among":[257,279],"people,":[260,281],"almost":[261],"received":[265],"scam":[266],"calls":[267],"or":[268],"text":[269],"messages,":[270],"accounting":[271],"99%,":[273],"which":[275],"8":[276],"were":[277],"scammed.":[278],"more":[282],"than":[283],"59.00%":[284],"people":[287],"expressed":[288],"dissatisfaction":[289],"government's":[292],"Internet":[293,303],"satisfaction":[295],"survey.":[296],"Therefore,":[297],"process":[300],"combating":[302],"fraud,":[304],"government":[306],"still":[307],"needs":[308],"step":[310],"up":[311],"its":[312],"efforts.":[313]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
