An аttаcker sends аn email tо emplоyees claiming tо be from the company’s IT department. The message states that the company can only afford for a small number of users to receive an immediate security upgrade and that the enrollment link will be disabled once the limited slots are filled. Which weapon of influence is the attacker primarily using?