Table 3 List of items queried on intended behaviour, suspicion, treatment check, FoMO scale and attention check.
Questionnaire | Items | Sources |
|---|---|---|
Intended behaviour | What action would you most likely take? | translated and adapted to |
Multiple choice | • open the link | Instagram from Frauenstein |
• send an answer | and Flowerday (2020) | |
• share the link | ||
• like the message | ||
• ignore the message | ||
• delete the message | ||
Suspicion | • I click links within the Instagram message without any doubts. | translated and adapted to |
Likert scale | • When I read the Instagram message, I believe its sender is reliable. | Instagram from Vishwanath |
• When I read the Instagram message, I believe its content is fake. | et al. (2018) and Chou et al. | |
• When I read the Instagram message, I believe it differs from other | (2021) | |
Instagram messages. | ||
• When I read the Instagram message, I believe it would bring | ||
unfavourable consequences of clicking links. | ||
Treatment Check | • When I ignore or delete the Instagram message, I fear missing out | |
Likert scale | on rewarding experiences with the message sender. | |
FoMO Scale | • I fear others have more rewarding experiences than me. | translated from Przybylski |
Likert Scale | • I fear my friends have more rewarding experiences than me. | et al. (2013) |
• I get worried when I find out my friends are having fun | ||
without me. | ||
• I get anxious when I don’t know what my friends are up to. | ||
• It is important that I understand my friends ‘in jokes.‘ | ||
• Sometimes, I wonder if I spend too much time keeping up with | ||
what is going on. | ||
• It bothers me when I miss an opportunity to meet up with friends. | ||
• When I have a good time, it is important for me to share the | ||
details online (e.g., updating status). | ||
• When I miss out on a planned get-together, it bothers me. | ||
• When I go on holiday, I continue to keep tabs on what my | ||
friends are doing. | ||
Attention Check | • Please select ‘Not at all true’. | |
Likert Scale | ||
Previous Experience | In a phishing attack, the attacker attempts to obtain the victim’s | |
with Phishing | sensitive data, e.g., user account login data. For this purpose, fake | |
single-choice | links pointing to fake websites are often used. Phishing attacks | |
are playing an increasingly important role in today’s world and | ||
pose a great threat to the victim. | ||
I have previous experience of dealing with phishing messages. | ||
• Other social media services |