This paper presents a Human-Computer Interaction Perspective on cyber–physical threat actors through an exploration of red-team activities undertaken by the principle author.
The concept of a ‘shadow user’ is posited as an alternate to long-held models of “hacker”, “threat actor” or “saboteur”, which positions HCI as a useful tool in the proactive prevention of cyber–physical attacks and a source of resilience by design in relevant systems.
History
School
Science
Department
Computer Science
Published in
2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA)
Source
7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.