What is a common characteristic of phishing emails that exploit the reciprocity bias?

(Select The Best Answer)