Introduction

Phishing continues to be a major online cyber threat, with average total costs of more than $4.6 million in 2021 (IBM Security, 2021) and, in recent years, record numbers from more than 4.7 million phishing attacks (Anti-Phishing Working Group, 2022). Phishers try to gain access to sensitive information, such as login credentials or credit card details, commonly by sending fake emails with social engineering (SE) techniques in which ‘the attacker(s) exploit human vulnerabilities by means of social interaction’ (Wang et al., 2020). For instance, phishers pretend to be the victims’ financial institutions through instigating authority, or they invoke social proof by pretending to be colleagues and friends (Frauenstein and Flowerday, 2020; Workman, 2008).

While email is still the most common attack vector, phishers increasingly make use of alternative channels, such as social media (James, 2023; Lourenço and Marinos, 2020). In social media phishing -also known as social or social network phishing (Frauenstein and Flowerday, 2020)-, phishers mostly attack in two stages (Vishwanath, 2017): within the first stage, they send their victim a friend request to gain access to their profile information. In the second stage, they contact their victim, often through personalised chat messages, to gain access to sensitive information. During both stages, phishers exploit the social nature of social media, for example, through using (profile) pictures and liking their victims’ posts (Vishwanath, 2017). Thus, phishers can easily pretend to be friends and exploit the human tendency to mimic the behaviour of relevant others (Frauenstein and Flowerday, 2020). Moreover, the increasing use of social media with 4.85 billion users worldwide (Kemp, 2023) and improved chat messages through generative artificial intelligence (AI) (Lourenço and Marinos, 2020) make social media phishing even more threatening. Although initial research investigates predictors of susceptibility to social media phishing, such as habitual use (Vishwanath, 2015b) or certain sender characteristics (e.g., profile picture) (Algarni et al., 2017; Vishwanath, 2017), phishing research (Algarni et al., 2017) as well as interventions (Franz et al., 2021) have mostly addressed email phishing so far. Yet, to establish user-centered interventions countering this novel and harmful phishing trend, research needs to better understand the user-specific characteristics that contribute to their susceptibility towards social media phishing (Waqas et al., 2023; Yan et al., 2018).

We aim to provide deeper insight into these by investigating the impact of the user’s relation to the message sender and an often observed phenomenon in social media: Fear of Missing Out (FoMO) (Tandon et al., 2021). FoMO refers to ‘a pervasive apprehension that others might be having rewarding experiences from which one is absent‘ (p. 1841) (Przybylski et al., 2013). Researchers often measure FoMO as a trait and the extent to which an individual in general fears missing out on social events, particularly when friends are attending (Bowman and Clark-Gordon, 2019; Przybylski et al., 2013). These individual differences in Trait FoMO were found to shape the users’ online behaviour, such as participating in social media despite his/her privacy concerns (Westin and Chiasson, 2021) or intending to buy recommended products from influencers (Dinh and Lee, 2022). However, its impact on social media phishing has been neglected so far, even though the social characteristics of social media are often exploited by attackers. For example, phishers who invite their victims to an event or other rewarding experience as a supposed friend, particularly through fake or hijacked accounts, could increasingly exploit users with high levels of Trait FoMO. Beyond that, such messages from phishers could trigger a situational FoMO on these rewarding experiences when not clicking. Such situational FoMO, triggered through a specific event that a user feels FoMO about, is known as State FoMO in the literature (Maxwell et al., 2022). Therefore, Trait and State FoMO could be exploited by phishers and lead users to quick heuristic decision processes, in which message cues such as a suspicious link are simply not considered (Frauenstein and Flowerday, 2020; Zhuo et al., 2023).

Young adults (approx. 16−25 years old, Devitt et al. (2009)) appear to be the most vulnerable user group to these attacks due to three major characteristics: First, young adults are more likely to be targeted because of their increased use of most social media platforms, particularly Instagram (Kemp, 2023). Second, young adults are more susceptible to phishing attacks via email and social media than older age groups (Parker and Flowerday, 2020; Sheng et al., 2010; Tornblad et al., 2010) and third, young adults feel increased Trait FoMO compared to older age groups (Przybylski et al., 2013). All of these characteristics make them an easy and more likely target of social media phishing, whose user-specific vulnerabilities are still largely unknown (Oliveira et al., 2017).

To address this research gap, we investigated young adults’ susceptibility towards (a) known and unknown senders (user-sender relation), (b) State FoMO through consequences of missing out on a specific rewarding experience when not clicking and (c) their individual level of Trait FoMO, with the following research questions (RQ):

  • RQ1: How is young adults’ susceptibility to social media phishing affected by the user-sender relation and the consequences of not clicking?

  • RQ2: How is young adults’ susceptibility to social media phishing related to individual differences in Trait FoMO?

Background and related work

This section provides an overview of why users fall for phishing on social media and related previous research. It then explains our hypothesis and the methods applied.

Cognitive approaches in phishing

The Suspicion, Cognition, and Automaticity Model (SCAM) (Vishwanath et al., 2018) and the underlying Heuristic Systematic Model (Chaiken, 1980; Eagly and Chaiken, 1993) highlight users’ cognitive processing as crucial to understand why users fall for phishing. Herein, two types of cognitive processing are distinguished: (1) heuristic processing, in which individuals base their decisions on salient cues and simple rules of thumb, and (2) systematic processing, in which all cues in a message are carefully considered (Vishwanath et al., 2018). According to SCAM (Vishwanath et al., 2018), a user’s processing, be it heuristic or systematic, depends on their perceived cyber risks when receiving the phishing email or chat message. If the perceived cyber risks are low, the user is more likely to engage in heuristic processing. As a consequence, such heuristic processing could lead to overlooking obvious phishing cues, such as a suspicious link, and increase susceptibility to phishing attacks (Vishwanath et al., 2018).

Social characteristics in social media phishing

Integrating these insights, one might fall for social media phishing as the social sender characteristics of social media (e.g., profile pictures) reduce the perceived cyber risks and trigger heuristic instead of systematic processing (Frauenstein and Flowerday, 2020; Vishwanath, 2015a). For instance, when a user receives a chat message from a phisher with a friendly and real profile picture, the profile picture could serve as a cue for the phishers authenticity (Vishwanath, 2015a). Based on this authenticity cue, the user could perceive reduced risks associated with the phisher and react quickly without considering all cues to the chat message (heuristic processing) (Vishwanath et al., 2018).

Initial research underscores social sender characteristics as a strong predictor for susceptibility to social media phishing. For instance, Vishwanath (2015a) found that the number of friends as well as the phisher’s profile picture increased users’ susceptibility towards friend requests and their likelihood to fall for phishing in personalised chat messages. According to the researchers, these two sender characteristics could increase heuristic processing through authenticity and social proof (Vishwanath, 2015a). Similarly, in a large-scale study, Algarni et al. (2017) found that the number of friends, real names, common friends, the number of posts, as well as common beliefs strongly affected the perceived sincerity of phishers and with that, the susceptibility to phishing attacks. These findings provide strong indications that social sender characteristics affect one’s susceptibility to social media phishing. Specifically, hijacked accounts from actual friends may pose a significant risk, as phishers can exploit these relationships with their victims. However, there has been limited research on phishing messages from user-related senders, such as actual friends. One Facebook study (N = 20) shows first evidence that the relation with the message sender (e.g., close friend or partner) seems to be an important predictor of susceptibility to social media phishing (Seng et al., 2019). Yet, it remains to be answered whether this effect can be confirmed for larger samples and across social media channels, such as younger adults’ most used social media platform Instagram (Kemp, 2023). This further includes different susceptibility indicators such as users’ suspicion, a commonly used measurement of deception detection (Vishwanath et al., 2018). However, understanding user-specific vulnerabilities is crucial for developing effective countermeasures against social media phishing. Therefore, investigating these social sender characteristics within vulnerable user groups such as young adults (Parker and Flowerday, 2020; Sheng et al., 2010; Tornblad et al., 2010) is relevant.

We aim to gain insight into the user-sender relation by examining young adults’ susceptibility both to known and unknown senders. To address current research gaps, we investigated the susceptibility of 193 young adults on Instagram -the most commonly used platform of young adults (Kemp, 2023)- with two complimentary susceptibility indicators: First, we assessed users’ intended behaviour through either susceptible (open/share the link or respond to/like the message) or non-susceptible responses (ignore/delete the message) as suggested by Frauenstein and Flowerday (2020). Second, we queried their level of suspicion through the suspicion scale (Chou et al., 2021; Vishwanath et al., 2018). In line with previous research on social sender characteristics (Algarni et al., 2017; Seng et al., 2019; Vishwanath, 2015a), it is proposed that: Hypothesis 1: Phishing messages from known senders increase young adults’ susceptibility compared to phishing messages from unknown senders. As we measured two indicators of susceptibility, it is referred here and below to increased susceptibility as an increase in susceptible responses and a decrease in the level of suspicion.

Young adults and Fear of Missing Out (FoMO)

Existing literature on FoMO refers to it in two ways: Trait FoMO and State FoMO (Holte, 2023; Maxwell et al., 2022). Trait FoMO is characterised by the ‘desire to stay continually connected with what others are doing’ (Przybylski et al., 2013). It refers to a user’s general FoMO on rewarding experiences. On the contrary, State FoMO is triggered by a specific event or situation and refers to a user’s current FoMO on a rewarding experience (Holte, 2023; Maxwell et al., 2022). Trait FoMO has been examined in various online contexts, and individual differences in Trait FoMO were found to contribute to social media (over-)use (Przybylski et al., 2013; Tugtekin et al., 2020) and excessive Instagram use (van der Schyff et al., 2022), making users high in Trait FoMO more likely to be victims of social media phishing. In addition, Trait FoMO was found to influence users’ privacy decisions. For example, it was found to elicit pressure in users to engage in social media despite their privacy concerns (Westin and Chiasson, 2021) and to disclose more information on social media services such as Instagram (van der Schyff and Flowerday, 2023). Furthermore, research shows that higher Trait FoMO is connected to increased online risk-taking, such as password sharing, among younger users (12 to 18 years old) (Popovac and Hadlington, 2020) and reduced information security awareness among employees (Hadlington et al., 2020). These findings suggest that Trait FoMO may also be a critical predictor of susceptibility, particularly for younger adults who tend to experience higher levels of Trait FoMO (Przybylski et al., 2013).

State FoMO, on the other hand, has not yet been extensively studied (Holte, 2023; Maxwell et al., 2022). However, preliminary research suggests that State FoMO is similarly associated with online behaviour, such as problematic social media use, as Trait FoMO (Holte, 2023). Therefore, State FoMO may also be an important predictor of susceptibility. Similar to phishing emails that exploit the fear of losing something important such as a course registration (Goel et al., 2017), phishers who invite users to a supposed event may exploit State FoMO by implying that not clicking will result in the consequence of missing out on the event. This urge to join in could then trigger users’ heuristic processing, increasing their susceptibility to phishing (Goel et al., 2017). This can be particularly threatening when users perceive low cyber risks, such as when they receive messages from hijacked accounts of actual friends (see SCAM, Vishwanath et al. (2018)).

Therefore, we investigate FoMO as a susceptibility predictor in two ways: (1) by assessing individual differences in Trait FoMO on the FoMO scale (Przybylski et al., 2013) and (2) by examining situational differences in State FoMO through different consequences of not clicking on chat messages inviting to an event. According to research on online risk taking (Popovac and Hadlington, 2020; van der Schyff and Flowerday, 2023; Westin and Chiasson, 2021), we proposed: Hypothesis 2: Young adults with high compared to low Trait FoMO are more susceptible to social media phishing. As not clicking is connected to consequences such as missing out on a specific event with others, messages implying such consequences of not clicking may induce State FoMO. Therefore, we proposed increased susceptibility for low/high compared to no consequences of not clicking (3.1) and for high compared to low consequences of not clicking (3.2) through increased feelings of State FoMO: Hypothesis 3.1 Phishing messages indicating low/high compared to no consequences of not clicking increase young adults’ susceptibility. Hypothesis 3.2 Phishing messages indicating high compared to low consequences of not clicking also increase young adults’ susceptibility. Our evaluation of these hypotheses aims to provide three major contributions: (a) Empirical evidence on how the user-sender relation, situational differences in State FoMO and individual differences in Trait FoMO shape phishing susceptibility in social media for the younger age group, (b) Methodological implications of studying social media phishing and (c) Suggestions such as unobtrusive interventions or notifications (e.g., nudges) to address young adults’ susceptibility online.

Methodology

In an experimental online vignette study, participants were asked to imagine being in a certain scenario and to react to different Instagram chat screens that contained varying social media messages and (potential) phishing links. The study was conducted online using the software tool PavloviaFootnote 1 and designed with the user-sender relation (unknown vs. known) and the consequences of not clicking (no vs. low vs. high) as independent within-participant factors. In other words, participants received messages from known and unknown senders with no, low or high consequences of not clicking. The latter ranged from missing an event with no other user (no) to missing an event with one (low) or several other users (high). As dependent variables, two indicators of susceptibility were measured: (1) Intended behaviour and (2) Suspicion.

Procedure

Approximately 10−15 minutes were required to complete the study. Before the study started, each participant gave informed consent. Afterwards, participants were queried about their estimated amount of leisure time spent online and the social media platforms they use. Further instructions on the vignette task followed. The vignette task contained six text- and image-based vignette scenarios. The six vignette scenarios were presented twice: first, querying intended behaviour and, afterwards, querying the suspicion scale as well as a treatment check on State FoMO. After completion of all vignette scenarios, participants’ Trait FoMO was queried on the FoMO scale (Przybylski et al., 2013). Then, social media phishing was explained in more detail, and previous experience with phishing via email, Instagram and other social media services was queried. Thereafter, participants were asked to provide demographics. Lastly, debriefing information detailing the study aim and assumptions was presented, and participants were able to save their data. The procedure is visualised in Fig. 1.

Fig. 1: Study procedure.
figure 1

The figure shows the procedure sequence in the following order: (1) consent; (2) preliminary questionnaires: internet and social media use; (3) first presentation of vignettes for intended behaviour; (4) second presentation of vignettes for suspicion and treatment check; (5) follow-up questionnaires: Trait FoMO, attention check, phishing experience, demographics; (6) debriefing.

Vignettes

This study utilised so-called vignette scenarios, including short-text and -image scenarios of direct chat messages on Instagram. While it should be noted that this methodology does not capture the complexity of real-life situations due to its focus on specific scenarios and cannot be fully generalised to actual behaviour, the scenarios allowed us to systematically investigate our study objective in more realistic scenarios than traditional questionnaire items (Atzmüller and Steiner, 2010). For a detailed reflection on the limitations of this study, see Section Limitations and implications for future work. The vignette scenarios were systematically varied for two short-text scenarios describing the sender as either unknown or known (see Table 1) and chat messages describing no, low, or high consequences for not clicking the link (see Table 2).

Table 1 Translated text-based scenarios for the relation to the message sender.
Table 2 Translated message scenarios, sorted by the level of consequences of not clicking.

As user-sender relation (known vs. unknown) and consequences of not clicking (no vs. low vs. high) were varied within participants, we created two gender-neutral message formulations to avoid presenting the same message twice from unknown and known senders. Similarly, this study contained six picture-name- and gender-balanced senders with one phishing link each (see Fig. 2) to avoid carry-over effects through phishing messages from the same sender or link. This resulted in three messages from male and three messages from female senders with six phishing links, which were counterbalanced across the conditions. Phishing links were based on a pilot study (N = 21) in which 18 fictitious and self-created phishing links were rated for their phishing detection difficulty on a scale from 1 ‘It is easy for me’ to 3 ‘It is difficult for me‘. Moreover, participants were asked for the criteria on which they rated the links and their previous phishing experience. Based on the pilot study, six phishing links of medium difficulty (M = 1.52 to 2.24) were selected. An overview of the resulting sender-link designs is shown in Fig. 2.

Fig. 2: Translated examples of the picture-name and gender-balanced sender-link designs with six phishing links for high consequences of missing out.
figure 2

Note: The figure shows six fictitious Instagram chat screens with the following sender-link combinations: (1) Anna-Lena (female), www.eventim.ru/verify-ticket, (2) Luisa (female): www.ticketswap.cn/rockon&jl9, (3) Corinna (female): www.besteventickets.ru/order, (4) Philipp (male): www.myticket.cn/tickets-confirm, (5) Markus (male): http://eventim.net/download, (6) Tobias (male): http://miticket.ru/anmeldung.

Susceptibility indicators: intended behaviour and suspicion

Two indicators of susceptibility were queried: (1) intended behaviour and (2) suspicion. First, participants were asked how they would react to the Instagram message to assess intended behaviour (translated and adapted to Instagram from Frauenstein and Flowerday (2020), see Table 3). Similar to Frauenstein and Flowerday (2020), responses were categorised as (a) either non-susceptible when participants indicated to ignore/delete the message or (b) susceptible when participants indicated to open/share the link or respond to/like the message for analysis. As multiple answers were possible, contradictory statements, containing intended behaviour that could be categorised as non-susceptible and susceptible (e.g., ignoring and responding to the message at the same time) were excluded from the analysis (1.1% of all responses).

Table 3 List of items queried on intended behaviour, suspicion, treatment check, FoMO scale and attention check.

Second, we queried a translated and Instagram-adapted version of the suspicion scale (Chou et al., 2021; Vishwanath et al., 2018). The scale included five items such as ‘I click links within the Instagram message without any doubts.’ (see Table 3) on a Likert scale from 1 ‘I do not agree at all‘ to 6 ‘I fully agree’. For analysis, the mean of the suspicion scale (Cronbach’s α = 0.82−0.97) was calculated for each vignette scenario. Mean values range from 1, indicating no suspicion, to 6, indicating high suspicion.

Treatment check: state FoMO

As a treatment check, we queried participants’ State FoMO for each message scenario on a Likert scale item ranging from 1 ‘I do not agree at all’ to 6 ‘I fully agree’ (see Table 3) at the end of the suspicion scale.

Questionnaires

Preliminary questionnaires

Average time online and social media use

In the preliminary questionnaire, participants were asked about their estimated leisure time online for a typical day during the week and on weekends in hours, as well as which social media platforms they use.

Follow-up questionnaires

Trait FoMO

To identify individual differences in Trait FoMO, we assessed the 10-item Trait FoMO scale by Przybylski et al. (2013) on a Likert scale from 1 ‘Not at all true’ to 5 ‘Absolutely true’ (see Table 3). The scale examines the extent to which someone in general fears missing out on social events, particularly when friends are attending (Bowman and Clark-Gordon, 2019; Przybylski et al., 2013), and demonstrates high internal consistency (Cronbach’s α = 0.82 (Przybylski et al., 2013), see also Bowman and Clark-Gordon (2019) for further information on reliability). For analysis, participants were split in two groups along the mean: when participants’ mean score was below the sample mean (M < 3.15), they were categorised as having a low Trait FoMO score (48.7% of all participants) indicating low Trait FoMO, whereas when participants’ mean score was higher than or equal to the average mean (M > 3.15), they were categorised as having a high Trait FoMO score (51.3% of all participants), indicating high Trait FoMO.

Attention check

As an attention check, participants were instructed to select ’Not at all true’ on one item in addition to the FoMO scale. This was rated on a Likert scale from 1 ‘Not at all true’ to 5 ‘Absolutely true’.

Previous experience with phishing

Previous experience with phishing via email, Instagram, or other social media services was queried with the response options ‘yes’, ‘no’ and ‘I do not know’. To avoid conceptual ambiguities, participants received a definition of the term ‘phishing’ (see Table 3).

Demographic information

Lastly, participants’ demographic information (age, gender, educational degree, occupation) was queried.

Participants

A total of N = 206 people participated in our study. Participants older than 25 years, who were outside our examined age range, or participants who failed the attention check were excluded (Nexcluded = 13). Data from a total of N = 193 young adults (120 females, 73 males) were analysed. Participants were between 16 and 25 years and on average 21 years old (M = 20.99, SD = 2.83). Further information on the participants’ demographics can be found in Table 4. Participants were recruited via email, social media, research platforms, and direct inquiries to schools and universities. Participation was voluntary, and students from RWTH Aachen University could receive course credits for participation.

Table 4 Participants demographics for the online study.

Results

The analyses were conducted with the software R (R Core Team, 2019) and RStudio (RStudio Team (2022), Version 2022.12.0), particularly the lme4 package (Bates et al., 2015). The log-odds of intended behaviour were modelled using multilevel (mixed-effect) logistic regression, as intended behaviour was measured as a dichotomous variable (susceptible vs. non-susceptible). Additionally, given the use of a repeated-measures design, the measurements were nested within the participants, necessitating a multilevel structure. For the dependent variable suspicion, multilevel (mixed-effect) linear regression was calculated because suspicion can be considered a continuous variable. Additionally, the multilevel structure was required because the intra-class-coefficient (ICC) indicated that the variances in suspicion was partially (32%) explained by between-subject differences. The repeated-measures design was utilised with a multilevel structure for both analyses. For logistic and linear regression analyses, assumptions were checked and fulfilled.

Within our analyses, one multilevel logistic and linear confirmatory regression analysis with both within-subject factors (user-sender relation, consequences of not clicking) and their interaction terms was calculated. Afterwards, the exploratory regression analyses were calculated, in which we added questionnaire-based predictors as a single predictor to the confirmatory regression equation. These predictors were Trait FoMO (low vs. high), previous phishing experience via email, on Instagram, or on other social media services (no vs. previous experience), and gender (male vs. female). Further, the interaction term of user-sender relation and Trait FoMO was investigated. All predictors were dummy-coded. Statistical significance was tested at α = 0.05.

Confirmatory multilevel logistic regression: influences of user-sender relation and consequences of not clicking on intended behaviour

Within our confirmatory analysis of intended behaviour, we found the proposed effect of user-sender relation: When participants received phishing messages from known senders, they were more likely (β = 15.18, p < .001, OR = 3.90e + 06, 95 % CI: [4.98e + 05, 3.05e + 07]) to show susceptible responses than when they received phishing messages from unknown senders. Interestingly, the effect of sender was much larger than expected, with a 100 % predicted probability to show susceptible responses (open/share the link or respond to/like the message) when phishing links were received from known compared to unknown senders. Contrary to hypotheses 3.1 and 3.2, we did not find the proposed effect for consequences of not clicking: Participants were not more likely to show susceptible responses when phishing messages implied low compared to no consequences (β = 0.31, p = 0.67, OR = 1.36, 95 % CI: [0.34, 5.49]) or high compared to no consequences (β = 0.01, p = 0.99, OR = 1.01, 95 % CI: [0.23, 4.36]). Furthermore, they were not more likely to show susceptible responses when phishing messages implied high compared to low consequences (β = −0.30, p = 0.69, OR = 0.74, 95 % CI: [0.18, 3.12]). In addition, no significant interactions between user-sender relation and consequences of not clicking were found. Thus, the effect of user-sender relation does not seem to be affected by the consequences of not clicking (p ≥ 0.50, see Table 5). Table 5 summarises the results of the confirmatory multilevel logistic regression.

Table 5 Results of the confirmatory multilevel logistic model for intended behaviour (DV) as predicted by user-sender relation (unknown, known sender) and consequences of not clicking (no, low, high).

Frequencies: intended behaviour

The frequencies over all responses indicated that 41.1% of all responses were susceptible. Moreover, 160 (82.9%) participants showed at least one response which was categorised as susceptible. To gain in-depth insight into the large effects of user-sender relation (see Figure Table 5), frequencies for susceptible and non-susceptible responses were calculated for both unknown and known senders (see Table 6). Within our sample, a relative frequency of 6.6 % (N = 31) showed susceptible responses to unknown senders, whereas 93.4 % (N = 440) showed susceptible responses to known senders over all susceptible responses (N = 471). Further, splitting the coded non-susceptible and susceptible responses into the six given response options, the frequency table indicates responding to the message (N = 295) and opening the link (N = 257) as the most frequently selected options for susceptible responses. Ignoring the message (N = 359) was the most frequent option for non-susceptible responses.

Table 6 Frequency table of the coded (non)-susceptible responses and the response options (multiple answers possible) by user-sender relation (unknown, known sender).

Exploratory multilevel logistic regression: other influences on intended behaviour

We did not find a significant difference in intended behaviour between individuals with low and high levels of Trait FoMO (β = 1.04, p = 0.17, OR = 2.82, 95 % CI: [0.64, 12.39]). However, an interaction between user-sender relation and Trait FoMO (β = 3.11, p < 0.05, OR = 22.43, 95 % CI: [1.49, 338.13]), which significantly improved model fit (p < 0.05), was examined. In line with Sommet and Davide (2017), the data was split between participants (1) with low and (2) high Trait FoMO scores. Two multilevel logistic regression analyses were calculated on the split data sets. The split-data analysis revealed that the chances for susceptible responses towards known compared to unknown senders sharply increased when participants indicated high (β = 19.27, p < 0.001, OR = 2.33e + 08, 95 % CI: [2.91e + 06, 1.87e + 10]) compared to low Trait FoMO scores (β = 9.03, p < 0.001, OR = 8.36e + 03, 95 % CI: [5.19e + 02, 1.35e + 05]). The effects of gender (β = 0.30, p = 0.68, OR = 1.35, 95 % CI: [0.32, 5.58]) and previous phishing experience via email (β = −0.36, p = 0.68, OR = 0.70, 95 % CI: [0.13, 3.79]), Instagram (β = 0.09, p = 0.90, OR = 1.09, 95 % CI: [0.26, 4.62]) and other social media platforms (β = −0.11, p = 0.89, OR = 0.90, 95 % CI: [0.20, 4.09]) were non-significant, indicating no effect on users’ intended behaviour.

Confirmatory multilevel linear regression: influence of sender and consequences of not clicking on suspicion

Our results confirmed the proposed effect of user-sender relation on users’ suspicion (see Fig. 3): When participants received phishing messages from known senders, they showed less suspicion (β = −1.70, 95 % CI: [−1.88, −1.53], p < 0.001) than when phishing messages were received from unknown senders. However, similar to the effects on intended behaviour, the proposed effect for consequences of not clicking on young adults’ suspicion was not found. Suspicion did not significantly differ in low compared to no consequences (β = −0.04, 95 % CI: [−0.21, 0.14], p = 0.69) nor in high compared to no consequences (β = 0.01, 95 % CI: [−0.16, 0.18], p = 0.93). Similarly, suspicion did not differ between high compared to low consequences (β = 0.04, 95 % CI: [0.13, 0.21], p = 0.63). In addition, no significant interactions between user-sender relation and consequences of not clicking were found (p ≥ 0.52). Table 7 summarizes the results of the confirmatory multilevel linear regression.

Fig. 3: Predicted values of suspicion from 1 (low suspicion) to 6 (high suspicion) divided into no, low, and high consequences of not clicking for unknown and known message sender.
figure 3

Error bars indicate the confidence intervals of the predicted values.

Table 7 Results of the confirmatory multilevel linear model for suspicion (DV) predicted by user-sender relation (unknown, known sender) and consequences of not clicking (no, low, high).

Exploratory multilevel linear regression: other exploratory influences on suspicion

As proposed in Hypothesis 2, we observed the effect of Trait FoMO on suspicion: Participants with high Trait FoMO scores reported lower suspicion towards phishing messages compared to those with low Trait FoMO scores (β = −0.90, 95 % CI: [−1.16, −0.64], p < 0.001, see Fig. 4). Interestingly, the analysis also revealed a significant interaction effect between user-sender relation and Trait FoMO (β = −0.48, 95 % CI: [−0.67, −0.28], p < 0.001). The data were split between (1) low and (2) high Trait FoMO scores, in which two multilevel linear regression analyses were calculated on the split data sets (Sommet and Davide, 2021). The split data analysis revealed that suspicion for known compared to unknown senders sharply decreased when participants indicated high Trait FoMO scores (β = −1.94, 95 % CI: [−2.16, −1.71], p < 0.001) compared to low Trait FoMO scores (β = −1.46, 95 % CI: [−1.71, −1.20], p < 0.001).

Fig. 4: Predicted values of suspicion from 1 (low suspicion) to 6 (high suspicion) divided into low and high Trait FoMO score and unknown and known message sender.
figure 4

Error bars indicate the confidence intervals of the predicted values.

In addition, we found that previous phishing experience via email (β = 0.58, 95 % CI: [0.22, 0.93], p < 0.01) and other social media platforms than Instagram (β = 0.35, 95 % CI: [0.02, 0.68], p < 0.05) significantly increased participants’ suspicion towards phishing messages compared to no previous experience. Surprisingly, compared to no previous experience, for previous phishing experience with Instagram only a marginal significant increase in suspicion was found (β = 0.30, 95 % CI: [−0.02, 0.62], p = 0.07). Lastly, gender was analysed as a predictor for suspicion. Our analysis revealed no effects of gender on users’ suspicion (β = −0.10, 95 % CI: [−0.40, 0.20], p = 0.52).

Treatment check

As a treatment check, we examined whether consequences of not clicking (no vs. low vs. high) increased State FoMO in the message scenarios. As the item for State FoMO was not normally distributed, two non-parametric Friedman tests with an α-level of 0.05 comparing no, low, and high consequences of not clicking for (1) known and (2) unknown senders were calculated. For messages from known senders, the Friedman test indicated significant differences (χ2 (2) = 57.13, p < 0.001, w = 0.15) in State FoMO: Post hoc tests revealed that participants perceived higher State FoMO for low (difference = 60.00) and high (difference = 108.00) compared to no consequences of not clicking. Moreover, participants perceived significantly higher State FoMO for high (difference = 48.00) compared to low consequences of not clicking (critical difference = 47.03). For messages from unknown senders, the Friedman test also indicated significant differences (χ2 (2) = 34.53, p < 0.001, w = 0.09) in State FoMO. However, participants only perceived significantly higher State FoMO in high (difference = 71.00) compared to no consequences. On the contrary, State FoMO did not differ in low compared to high (difference = 35.50) nor in low compared to no (difference = 35.50) consequences of not clicking (critical difference = 47.03). Figure 5 shows that State FoMO is increased for known senders (Median = 2 to 4) compared to unknown senders (Median = 0).

Fig. 5: Boxplots for State FoMO.
figure 5

The boxplots range from 1 (low state FoMO) to 6 (high state FoMO) and are divided into no, low and high consequences of not clicking on phishing messages received from unknown or known message senders.

Discussion

To develop effective countermeasures against phishing attacks on social media, understanding how the senders’ social characteristics and message content influence young adults’ susceptibility is crucial. This study represents a first step in this direction, examining (1) the impact of the users’ relation to the message sender, (2) the implied consequences of not clicking that induce State FoMO in phishing messages, and (3) the effect of users’ Trait FoMO on their phishing susceptibility to such attacks on social media.

As first research indicates sender characteristics (e.g., profile picture) and the user-sender relation (e.g., close friend) to increase users’ susceptibility towards social media phishing (Algarni et al., 2017; Seng et al., 2019; Vishwanath, 2015a), we assumed comparable effects for young adults on Instagram. Therefore, hypothesis 1 proposed that phishing messages from known senders increase young adults’ susceptibility compared to unknown senders. Our findings aligned with our expectations, yet they surpassed the anticipated effect size, underscoring the user-sender relation as a key predictor of susceptibility. A substantial majority of participants (93.4%) exhibited susceptible responses, such as answering the message or opening the link, when phishing messages were received from known senders. Compared to unknown senders, a predicted probability of 100% to show susceptible responses and sharply decreased suspicion towards known senders was revealed. In addition, we examined Trait FoMO, which has not been previously examined as a predictor for susceptibility on Instagram. However, it has been examined to affect online behaviour such as social media (over-) use (Przybylski et al., 2013; Tugtekin et al., 2020) or online risk-taking in younger users (Popovac and Hadlington, 2020). In hypothesis 2 we therefore proposed that high Trait FoMO increases susceptibility to social media phishing compared to low Trait FoMO. Our results partially confirmed our hypothesis: although young adults with high compared to low Trait FoMO scores were not more likely to show susceptible responses, evidence was found that high Trait FoMO scores decrease young adults’ suspicion towards phishing. Additionally, our results indicated that high Trait FoMO exacerbate the impact of user-sender relation: Young adults high in Trait FoMO showed more likely susceptible responses and decreased suspicion towards known compared to unknown senders than young adults low in Trait FoMO. As preliminary research indicated that State FoMO is similarly associated with online risk behaviour, as Trait FoMO (Holte, 2023), we investigated the consequences of not clicking within phishing messages as predictor for phishing susceptibility and assessed whether these can induce feelings of State FoMO in our participants. We proposed that phishing messages, implying low or high consequences of not clicking, increase susceptibility compared to no consequences of not clicking (hypothesis 3.1). Additionally, we assumed that phishing messages, implying high consequences of not clicking, increase susceptibility compared to low consequences of not clicking (hypothesis 3.2). However, other than expected, neither more likely susceptible responses nor less suspicion were found between no, low, and high consequences of not clicking. The treatment check therefore indicated that State FoMO seems to depend on the relation with the message sender, in which the proposed gradation of State FoMO was solely shown when messages were received from known senders. Lastly, exploratory analysis revealed that young adults’ suspicion increased when they had previous experience with phishing via email or other social media services than Instagram. However, differences in gender did not seem to affect young adults intended behaviour or suspicion towards social media phishing.

As our study showed a much stronger effect of the user-sender relation for young adults on Instagram than previous studies for users on Facebook (Seng et al., 2019) or for other social sender characteristics (Algarni et al., 2017; Vishwanath, 2015a), it remains open to question why such an enhanced effect was found. One explanation could lay in the younger-aged sample: First, the effects of user-sender relation could be amplified for young adults, as they are found to be more susceptible to phishing in general (Frauenstein and Flowerday, 2020; Sheng et al., 2010; Tornblad et al., 2010). Second, the effects could be further increased as our younger sample showed increased Trait FoMO scores (Mourstudy = 3.15) compared to previous studies such as from Przybylski and co-authors (MYoungAdults = 2.37, Przybylski et al. (2013)).

Although our results indicated that users perceived higher State FoMO as intended for the different levels of consequences of not clicking (no < low < high), at least for known senders, the expected effects for the consequences of not clicking were not found. In other words, neither more likely susceptible responses nor less suspicion for high versus low versus no consequences of not clicking were found. One explanation could be that the user-sender relation is considered first in the decision process. As mentioned above, if the sender is perceived as trustworthy and authentic, low perceived cyber risks or heuristic processing could be triggered. However, if the sender is perceived untrustworthy and inauthentic, high perceived cyber risk and more systematic processing could be activated (see SCAM, Vishwanath et al. (2018)). In both cases, the chat message content and, thus, the consequences of not clicking could become less relevant for the decision process because the sender served as the initial criterion for trust and authenticity of the message.

Lastly, our results suggest that particularly young adults with high Trait FoMO and no previous phishing experience are vulnerable to social media phishing, as both indicators decreased users’ suspicion. Herein, high Trait FoMO seems crucial, as it was associated with increased susceptibility towards known compared to unknown senders. These findings underscore that Trait FoMO can easily be exploited through phishers, especially when they impersonate a follower or friend. Coupled with the high susceptibility to our phishing messages - where 82.9 % of young adults showed susceptible responses to at least one phishing message -, counteracting social media phishing becomes highly relevant.

Counteracting social media phishing

Therefore, we suggest three intervention approaches: (1) Phishing awareness campaigns to raise awareness for cyber risks on social media, (2) Security nudges in social media chat messages to interrupt heuristic processing and (3) Emotional awareness campaigns to counteract high feelings of Trait FoMO. These three intervention approaches have been tested in current human-computer interaction (HCI) research, among others, to counteract vulnerabilities to email phishing. Therefore, they could be applicable to counteract the vulnerabilities related to social media phishing identified in our research.

As a first step, phishing awareness campaigns and training, commonly applied in email phishing (Franz et al., 2021), should be implemented and customised to the social characteristics exploited by phishers on social media platforms such as Instagram. These campaigns could then increase awareness of the cyber risks of social media and reduce the high susceptibility identified in our findings.

However, since campaigns and training alone may lead to decreased awareness over time (Franz et al., 2021), we propose security nudges in chat messages as an intervention approach to reach young adults where phishing affects them. Nudges, after Thaler and Sunstein (Thaler and Sunstein, 2009), can be described as small interface tweaks that guide users in the desired direction without limiting the existing choice set, i.e., none of the choices are made significantly more costly or prohibited. In cybersecurity research, nudges have already been trialled to nudge towards the secure direction in the context of secure password creation (Zimmermann and Renaud, 2021; Zimmermann et al., 2023), secure Wi-Fi choices (Turland et al., 2015), cookie consent banners (Gerber et al., 2023), and also phishing (Franz et al., 2021). Phishing-related examples include the highlighting of domains (Lin et al., 2011) and interventions, leveraging social influences (Nicholson et al 2017) or using fear appeals (Schuetz et al., 2020). From an ethical standpoint and building on previous work by Hansen and Jespersen (Hansen and Jespersen, 2013), transparent nudges, such as reminders on the consequences of a particular behaviour (Caraban et al., 2019), targeting systematic processing were deemed most favourable. Related work could show that these nudges, while transparent, were still effective (Kroese et al., 2016; Zimmermann and Renaud, 2021; Zimmermann et al., 2023) and even have the potential to interrupt heuristic processes (Acquisti et al., 2017; Gerber et al., 2023). As social sender characteristics and the user-sender relation seem to trigger such heuristic processing (Frauenstein and Flowerday, 2020; Vishwanath, 2015a), interrupting these processes through transparent nudges could be highly beneficial in counteracting social media phishing. Herein, it appears crucial to place the nudge closely to the message and the actual decision taken. This is because even a single extra click could represent too much effort to take when pursuing other main tasks (Zimmermann and Renaud, 2021), such as reacting to social media messages. Future work could therefore examine non-intrusive nudges embedded directly into the social media chat interface (e.g., a visual warning) to reduce phishing susceptibility. As a result, this could interrupt heuristic processing and increase suspicion towards the message sender so that the message is checked in more detail.

Lastly, our findings highlight that high Trait FoMO reduced young adults’ suspicion and amplified the impact of user-sender relation. Thus, supporting young adults in their emotion regulation may be another approach to counteract social media phishing. Herein, the effectiveness of user-centred emotion awareness campaigns, as suggested by Chen et al. (2022), could be investigated. Considering our findings, such campaigns could be not only promising to improve emotional well-being (Chen et al., 2022) but also to reduce phishing susceptibility.

Limitations and implications for future work

Our study has limitations that lead to methodological implications and suggestions for future work.

First, through the strong effects of the user-sender relation, particularly shown through intended behaviour, we cannot fully clarify the extent to which other potential susceptibility predictors, such as implied consequences of not clicking in phishing messages, affect susceptibility. Therefore, it might be helpful to preserve a lower user-sender relation in future research, for instance, when capturing other susceptibility indicators (e.g., scarcity). For instance, future studies could investigate the consequences of not clicking or other susceptibility indicators, such as scarcity, implied in messages within typical two-stage phishing attacks. These attacks often utilise social sender characteristics like profile pictures and friend counts, especially in fake accounts rather than in hijacked ones.

Second, this study used experimental online vignette survey methodology to systematically investigate the effects of the user-sender relation and the consequences of not clicking in more realistic scenarios than traditional questionnaire items (Atzmüller and Steiner, 2010). The integration of complementary indicators of susceptibility helped us draw conclusions about actual behaviour. Nevertheless, our experimental design cannot be fully extrapolated to actual behaviour because it focuses on specific and reduced scenarios, which do not fully capture the complexity of real-life situations. We therefore recommend gaining insights through qualitative data approaches such as online ethnography, e.g., through online observations or interviews with young adults on Instagram (Skågeby, 2011) to increase external validity in future research. In addition, we recommend investigating real phishing attacks on social media, e.g., by impersonating a phisher (Vishwanath, 2015b). However, conducting such real-life field studies poses ethical challenges, e.g., regarding privacy or informed consent (Munteanu et al., 2021), which need to be carefully addressed.

Lastly, even though we did not find an effect of gender on young adults’ susceptibility to social media phishing, gender or other demographics (e.g., education, social media usage time) could be examined in the understudied area of social media phishing for young adults and other age groups in future research. This is particularly important because previous studies on email phishing have shown contradictory results across different demographic variables (e.g., gender or education, Tornblad et al. (2010)).

Conclusion

Our study expands previous social media phishing research. Our results provide unique empirical insights that highlight the user-sender relation as a crucial contributor to young adults’ phishing susceptibility and their State FoMO when ignoring or deleting messages. High Trait FoMO, referring to a users’ general FoMO on rewarding experiences (Holte, 2023; Maxwell et al., 2022), was found to reduce young adults’ suspicion and to amplify the impact of the user-sender relation on young adults’ susceptibility. For future research, we recommend maintaining a low user-sender relation to explore other potential predictors of susceptibility. In addition, we suggest combining complementary susceptibility indicators, such as suspicion and intended behaviour, as well as conducting real-life field studies to gain more insight into why users fall for phishing. To develop countermeasures against social media phishing, we suggest investigating the effectiveness of non-intrusive nudges, such as visual warnings.