An employee in the accounting department recently received a phishing email that instructed them to click a link
in the email to view an important message from the IRS which threatened penalties if a response was not
received by the end of the business day. The employee clicked on the link and the machine was infected with
malware. Which of the following principles BEST describes why this social engineering ploy was successful?