Sunday, July 16, 2023

Computers: Do We Need Them to Do Our Jobs?

 

For this post, to emphasize the importance of technology in the workplace, I have chosen the fashion industry. Within the fashion industry, organizations are relying more and more on technology to conduct business, from websites to applications, logistics, manufacturing, and order processing, all aspects of the industry require the use of technology. It is extremely important that all users of technology within the industry are computer literate in order to perform their job functions as well as have knowledge of compliance and regulatory requirements to work in this industry. Over the last decade, the fashion industry has come to rely on technology in terms of designing garments, marketing and selling these items, and processing transactions. Creating the convenience for consumers to shop for items from virtually anywhere creates the need for faster, more secure ways to get the best shopping experience they can. In the next ten years, the digitization of the fashion industry will provide not only consumers, but organizations with innovative ways to shop, from VTO (virtual try on) applications to AI to create a personal shopping experience to more enhanced security features to make shopping safer and maintaining the integrity of websites and applications to protect user data not only on the consumer side but also for the organizations to prevent potential data breaches or other incidents where systems could be infiltrated allowing access to financial, personal or other data. The use of cloud computing as well as other forms of cybersecurity measures are being implemented more within the fashion industry to curb the potential for a breach, including the use of the aforementioned VTO systems. However, there is concern that these types of systems can be vulnerable as well, so the discussion has arisen to protect shopper data by implementing further safeguards such as creating laws similar to HIPAA that will not allow disclosure of any personal data that may be used by threat agents to compromise safety. 

No comments:

Post a Comment