Many victims are drawn into scams not because they are careless, but because trust is a normal and valued part of social life. The Trusting Connector profile explains why people become vulnerable when messages appear to come from authorities, familiar institutions, or trusted groups. This pattern is grounded in Authority Bias and Social Proof1, where perceived expertise, group consensus, or familiarity feels like evidence of safety. From the victim’s perspective, compliance happens because these social cues feel reassuring and difficult to question, not because of a lack of intelligence.
Understanding the Trusting Connector Profile
For victims who fit this profile, decisions are shaped less by the content of a message and more by who it seems to come from. Authority, belonging, and familiarity reduce caution and make compliance feel appropriate.
1. Authority and Delegated Judgment: When a message appears to come from a bank, government office, or technical support, victims may feel it is safer to follow instructions than to question them. Trust is placed in the role or title, and personal judgment is quietly delegated to the assumed expert.2
2. Belonging, In-Group Consensus, and Identity Protection: Messages linked to family, community, workplace, or shared identity feel safer because they come from “people like us.” For victims, doubting such messages can feel like risking rejection or disloyalty, making skepticism emotionally uncomfortable.3
3. Familiarity and the “Safe Because Known” Heuristic: Recognizable logos, writing styles, platforms, or repeated exposure create emotional comfort. Victims may interpret this comfort as reliability, especially when tired or under time pressure.
4. Relationship Cues and Perceived Personal Connection: Personalized language or shared references can shift victims into a cooperative mindset. In this state, questioning feels impolite or distrustful, and critical evaluation weakens.
Why Social and Authority Cues Override Skepticism
Social and authority cues often feel protective because they support belonging and identity. Questioning them can carry a social cost, such as embarrassment or fear of conflict. To avoid this discomfort, thinking shifts toward intuitive shortcuts, where the appearance of authority or group acceptance replaces verification. As a result, the motivation to pause, check independently, or seek another opinion is reduced.
Recommendations for the Public
Trust is not a flaw, but it must be paired with verification. The following habits help protect trust without creating unnecessary suspicion.
1. Recognizing Authority and Social Triggers: Trust often increases when messages reference authority, group identity, or personal connection.
Real life Application: Receiving a message that claims to be from a bank, workplace, or community group can feel automatically credible. Pausing to ask whether trust comes from verified identity or only from titles, logos, or familiarity helps interrupt automatic belief.
2. Separating Respect from Compliance: Respect for authority does not require immediate obedience. Legitimate institutions expect citizens to verify before acting.
Real life Application: If an unexpected message requests money, personal data, or urgent action, treat it as incomplete until it is confirmed through an official contact you already know.
3. Resisting Group Pressure: Signals that suggest widespread agreement or group participation can create pressure to comply without checking.
Real life Application: If a message implies that “everyone is doing this,” step back and verify the information independently rather than relying on perceived group consensus.
4. Challenging Familiarity-Based Trust: Familiar logos language or communication styles can create a false sense of safety.
Real life Application: Checking whether a message comes through an official app, domain, or contact used regularly is safer than relying on how professional or familiar it appears.
5. Normalizing Verification as Loyalty: Verification supports both personal safety and institutional integrity rather than undermining trust.
Real life Application: Reframe verification as responsible cooperation. Reframing checking as cooperation helps reduce discomfort about pausing or asking questions before acting.
- Cecilie S. Traberg et al., “The Persuasive Effects of Social Cues and Source Effects on Misinformation Susceptibility,” Scientific Reports 14, no. 1 (February 20, 2024): 4205, https://doi.org/10.1038/s41598-024-54030-y. ↩︎
- Whitty, Monica T. “Mass-Market Fraud and the Psychology of Scam Victims.” Criminology & Criminal Justice 13, no. 4 (2013): 441–456. ↩︎
- Van Bavel, Jay J., et al. “Using Social and Behavioural Science to Support COVID-19 Pandemic Response.” Nature Human Behaviour 7 (2023): 460–471. ↩︎