. . "We also examined news articles, journal publications, and other sources, including blogs, to compile information and identify contributing factors to UIT and social engineering." . .