Fig. 2From: A crowdsourcing method for online social networks security assessment based on human-centric computingArchitecture of the crowd assessment systemBack to article page