"

7.5 Describe Career Paths Open to Individuals with a Joint Education in Accounting and Information Systems

We use accounting information to make decisions about the business. Computer applications now provide so much data that data analytics is one of the newest career areas in business. Universities are beginning to offer degrees in data analysis. Software companies have created different applications to analyze data including SAS, Apache Hadoop, Apache Spark, SPSS, RapidMiner, Power BI, ACL, IDEA, and many more to help companies discover useful information from the transactions that occur. Big data refers to the availability of large amounts of data from various sources, including the internet. For example, social media sites contain tremendous amounts of data that marketing companies analyze to determine how popular a product is, and how best to market it. There is so much data to analyze that new ways of mining it for predictive value have evolved.

Another emerging area involves cryptocurrency, or the use of a digital currency that uses encryption technologies that make these cryptocurrencies impossible to counterfeit. The use of cryptocurrency does not require a bank to transfer or clear funds as is the case with other currencies. Bitcoin is the most well-known cryptocurrency. Blockchain is the platform on which Bitcoin is built. Blockchain serves as a shared ledger for Bitcoin but is also the foundation of many other applications. Simply put, blockchain offers different parties to a transaction (e.g., a buyer and a seller) the opportunity to use a shared ledger rather than each having their own separate ledgers as is the case with traditional systems. Bitcoin is currently accepted by some large, well-known companies including PwC and EY (the two largest of the “big 4” accounting firms), and Overstock.com.

Enterprise resource planning (ERP) software is a collection of integrated programs that track all operations in a company, from payroll to accounts payable, manufacturing, and maintaining electronic connections with suppliers. For example, companies that sell goods to Walmart, have access to Walmart’s electronic inventory records so the vendors can make sure Walmart has the right amount of goods on hand. Having such a close relationship brings rewards. They will probably receive payment sooner, using EFT (electronic funds transfer).

The use of accounting information systems (AISs) has drastically changed the way we prepare tax returns. Software is now written to walk anyone through preparing his or her own tax return using an expert system. An expert system asks questions like: are you married? If the answer is yes, the software knows to use the married tax tables, and if the answer is no, it uses the single tables. Based on this answer, it will know what kind of question to ask next. Accountants who understand expert systems and tax will be writing and auditing tax software programs.

Firms are also developing and using artificial intelligence (AI) systems to perform tasks previously performed by accounting professionals, but now are freeing up the professionals to perform higher-level tasks requiring analysis and judgment. Finally, security of all of this available data is a very important issue, and there are a number of career paths and certifications that information technology professionals can attain. The Information Systems Audit and Control Association (ISACA) offers several certifications including Certified Information Systems Auditor (CISA)Certified in Risk and Information System Controls (CRISC)Certified Information Security Manager (CISM), and others. There is so much technology that we are inundated with more information than we can use. Because the information is being generated by a machine, we generally trust the computation (although there are cases where a bug in the program can even cause problems with simple math), but we also know the old saying, “garbage in, garbage out.” The computer does not always know that your typo is garbage. If you enter the wrong number, the system processes it as if it were the right number. That means we have to build some way into the program to control what is input into the system. For example, if you fill out a form online and it asks for your zip code, does it let you enter just four digits? No—the computer knows that it should only go to the next step if you enter five digits. However, you can enter the wrong digits and it might not catch it. It is critical that we build as many internal controls into our computerized systems as possible so that we can find errors at the input stage before they get into our system. In other words, by using these “preventive” controls, we do not allow “garbage” data to get into our system.

Computerized AISs have also brought changes to the audit trail. In the past, accountants had a set of books that were paper based. You could see where a transaction was recorded and posted (and see if it had been erased). Once you enter it into a computer, it becomes part of an electronic audit trail, but the trail is only as good as the program that runs it. The screen could show you one number, but the system could be working with a different number all together. In fact, there have been criminal cases in which people wrote programs to cover up fraud. One such program functioned so that when an item was scanned, the correct amount displayed to the customer, but it was recorded in the books as a smaller amount, so the company paid less in sales tax and much less in income tax.

AISs have become more important because information and technology are more important.

CONCEPTS IN PRACTICE

Is Technology Always Better?

Technology allows one person to do a job that once took a dozen people to do. However, that can also lead to problems. For example, years ago, one person working in the accounts receivable department at Burlington Industries would have been in charge of a few customers. If those customers were not paying their bills on time, a person would be aware of it. Today, one person might be in charge of all accounts receivable. That person may not have time to call individual customers, so everything is preprogrammed. If the customer wanted to place a large order that caused them to go over their limit, the software would deny it instead of having a person weigh the risk of extending more credit.

A risk inherent in an AIS is that one person has access to a lot of information, and sometimes the information crosses department lines. Companies have to figure out ways to mitigate the risk, because AISs are truly essential to businesses today, especially with the growth of e-business and e-commerce. Think of the different business processes when a purchase is made through Amazon.com. Their AIS must be able to access inventory records, access customer information and records, process credit cards, calculate delivery dates, handle coupons or discounts, and remember where to ship the goods. Amazon would not be what it is today without all of its systems working together. Seeing what Amazon has accomplished opens the door for other companies to follow, and they will need people who understand the system.

Forensic accounting involves the use of accounting skills to inspect the accounting records in order to determine if fraud or embezzlement have occurred. Many universities are offering forensic accounting degrees to prepare students who can testify to criminal activity present in the accounting records.

CONCEPTS IN PRACTICE

The Founding of the Securities and Exchange Commission

In 1933 and 1934, the US Congress passed two acts that established the Securities and Exchange Commission (SEC), giving it the right to regulate and enforce the regulations concerning commerce in the United States. The website of the SEC (https://www.SEC.gov/) allows you to view all public company financial reporting and provides a link to all current litigation against individuals and companies that have been accused of breaking an SEC regulation. If you go to the site and look for the Litigation Releases section, you can click on individual cases and find that some cases of fraud involve the use of an accounting information system.

The Patriot Act also came out of the 9/11 attacks (signed October 26, 2001). The letters in Patriot stand for the following: providing appropriate tools required to intercept and obstruct terrorism. The goal of the act was to prevent any other attacks on the United States by allowing enhanced surveillance procedures.

The act gave law enforcement officials the right to access computers to track IP addresses, websites visited, credit card information provided electronically, and so on, in an effort to uncover terrorism before an attack was made. Several parts of the act call for banks to report suspected money laundering activities. Money laundering is an attempt to hide the facts of the original transaction and would involve an accountant. If you were selling drugs for cash and then tried to deposit that much cash in a bank, the bank would report it, so you would try to cover up where the cash came from and run it through a legitimate company. That is money laundering.

The Patriot Act also includes a section requiring auditors to verify that a company has controls in place to prevent an attack on its accounting information system and that the company has a disaster plan including backup records in case of a disaster.

The AIS enables a company to record all of its business transactions. Systems are different depending on the company’s needs. The AIS holds a lot of the information used to run a business. One system can provide everything needed for external reporting to government agencies involving payroll and income taxation. The same system can provide the data needed for managerial analysis used for pricing, budgeting, decision-making, and efficiency studies. Every company is required to keep records of their financial activity, and this means job security for people who are knowledgeable about AISs.

Key Takeaways

Key Concepts and Summary

  • Data analytics, artificial intelligence systems, data security credentials, blockchain applications, and forensic accounting are some of the areas that provide newer career avenues for accounting professionals.
  • Taxes will continue to be prepared using software that pulls information from the accounting information system.
  • Integrating accounting software with inventory management and electronic payment as used by Walmart and Amazon will set new standards of business process automation.
  • Forensic accounting, data security, artificial intelligence, and data analytics, are all areas for which companies and government agencies will be seeking accounting graduates who are also knowledgeable about information systems.

Glossary

accounting information system (AIS)
set of business processes that record transactions using journals and ledgers (for paper systems) and computer files (for computerized systems) to keep track of a company’s transactions, process the data associated with these transactions, and produce output useful for internal and external decision-making and analysis
accounts payable subsidiary ledger
special ledger that contains information about all vendors and the amounts we owe them; the total of all accounts in the accounts payable subsidiary ledger must equal the total of accounts payable control account in the general ledger
accounts receivable control
accounts receivable account in the general ledger
accounts receivable subsidiary ledger
special ledger that contains information about all customers and the amounts they owe; the total of all accounts in the accounts receivable subsidiary ledger must equal the total of accounts receivable control account in the general ledger
artificial intelligence
computerized systems that are taught to use reasoning and other aspects of human intelligence to mimic some of the tasks humans perform
audit trail
step-by-step trail of evidence documenting the history of a transaction from its inception and all the steps it went through until its completion
big data
data sets from online transactions and other sources that are so large that new software and methods have been created to analyze and mine them so they can provide insight into trends and patterns of the business
blockchain
underlying technology Bitcoin is built on; provides a single shared ledger used by all of the parties to a transaction resulting in cheaper, more secure, and more private transactions
cash disbursements journal
special journal that is used to record outflows of cash; every time cash leaves the business, usually when we issue a check, we record in this journal
cash receipts journal
special journal that is used to record inflows of cash; every time we receive checks and currency from customers and others, we record these cash receipts in this journal
cloud computing
using the internet to access software and information storage facilities provided by companies (there is usually a charge) rather than, or in addition to, storing this data on the company’s computer hard drive or in paper form
cryptocurrency
digital currency that uses encryption techniques to verify transfer of the funds but operates independently of a bank
data
parts of accounting transactions that constitute the input to an accounting information system
data analytics
analyzing the huge amount of data generated by all the electronic transactions occurring in a business
data/information storage
way to save data and information; can be on paper, computer hard drive, or through the internet to save in the cloud
enterprise resource planning (ERP)
system that helps a company streamline its operations and helps management respond quickly to change
expert system
software program that is built on a database; software asks question and uses the response to ask the next question or offer advice
forensic accounting
using accounting and computer skills to look for fraud and to analyze financial records in hard copy and electronic formats
point of sale
point of time when a sales transaction occurs
point-of-sale system (POS)
computerized system to record and process a sale immediately when it occurs, usually by scanning the product bar code
purchases journal
special journal that is used to record purchases of merchandise inventory on credit; it always debits the merchandise inventory account (if using the perpetual inventory method) or the Purchases account (if using the periodic method)
sales journal
special journal that is used to record all sales on credit; it always debits accounts receivable and credits sales, and if the company uses the perpetual inventory method it also debits cost of goods sold and credits merchandise inventory
schedule of accounts payable
table showing each amount owed and to whom it must be paid; total of the schedule should equal the total of accounts payable in the general ledger
schedule of accounts receivable
table showing each customer and the amount owed; total of the schedule should equal the total of accounts receivable in the general ledger
source document
paper document or electronic record that provides evidence that a transaction has occurred and includes details about the transaction
special journal
book of original entry that is used to record transactions of a similar type in addition to the general journal
turn-around document
paper document that starts off as an output document from one part of the accounting information system (billing sends bill to customer), that becomes input to another part of the accounting information system upon completion of the next phase of the process (accounts receivable receives payment made on bill)

 

Adapted from Principles of Accounting, Volume 1: Financial Accounting (c) 2010 by Open Stax. The textbook content was produced by Open Stax and is licensed under a Creative Commons BY-NC-SA 4.0 license. Download for free at https://openstax.org/details/books/principles-financial-accounting

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Bookkeeping Copyright © 2025 by Lemoore College is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.