Fig. 4From: A crowdsourcing method for online social networks security assessment based on human-centric computingAlgorithm flowBack to article page