Fig. 1From: A crowdsourcing method for online social networks security assessment based on human-centric computingCrowd computing flow chartBack to article page