Fig. 3From: A crowdsourcing method for online social networks security assessment based on human-centric computingHierarchy of the task assignmentBack to article page