Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo
Principles of Accounting, Volume 1: Financial Accounting

7.5 Describe Career Paths Open to Individuals with a Joint Education in Accounting and Information Systems

Principles of Accounting, Volume 1: Financial Accounting7.5 Describe Career Paths Open to Individuals with a Joint Education in Accounting and Information Systems

We use accounting information to make decisions about the business. Computer applications now provide so much data that data analytics is one of the newest career areas in business. Universities are beginning to offer degrees in data analysis. Software companies have created different applications to analyze data including SAS, Apache Hadoop, Apache Spark, SPSS, RapidMiner, Power BI, ACL, IDEA, and many more to help companies discover useful information from the transactions that occur. Big data refers to the availability of large amounts of data from various sources, including the internet. For example, social media sites contain tremendous amounts of data that marketing companies analyze to determine how popular a product is, and how best to market it. There is so much data to analyze that new ways of mining it for predictive value have evolved.

Another emerging area involves cryptocurrency, or the use of a digital currency that uses encryption technologies that make these cryptocurrencies impossible to counterfeit. The use of cryptocurrency does not require a bank to transfer or clear funds as is the case with other currencies. Bitcoin is the most well-known cryptocurrency. Blockchain is the platform on which Bitcoin is built. Blockchain serves as a shared ledger for Bitcoin but is also the foundation of many other applications. Simply put, blockchain offers different parties to a transaction (e.g., a buyer and a seller) the opportunity to use a shared ledger rather than each having their own separate ledgers as is the case with traditional systems. Bitcoin is currently accepted by some large, well-known companies including PwC and EY (the two largest of the “big 4” accounting firms), and

Enterprise resource planning (ERP) software is a collection of integrated programs that track all operations in a company, from payroll to accounts payable, manufacturing, and maintaining electronic connections with suppliers. For example, companies that sell goods to Walmart, have access to Walmart’s electronic inventory records so the vendors can make sure Walmart has the right amount of goods on hand. Having such a close relationship brings rewards. They will probably receive payment sooner, using EFT (electronic funds transfer).

The use of accounting information systems (AISs) has drastically changed the way we prepare tax returns. Software is now written to walk anyone through preparing his or her own tax return using an expert system. An expert system asks questions like: are you married? If the answer is yes, the software knows to use the married tax tables, and if the answer is no, it uses the single tables. Based on this answer, it will know what kind of question to ask next. Accountants who understand expert systems and tax will be writing and auditing tax software programs.

Firms are also developing and using artificial intelligence (AI) systems to perform tasks previously performed by accounting professionals, but now are freeing up the professionals to perform higher-level tasks requiring analysis and judgment. Finally, security of all of this available data is a very important issue, and there are a number of career paths and certifications that information technology professionals can attain. The Information Systems Audit and Control Association (ISACA) offers several certifications including Certified Information Systems Auditor (CISA), Certified in Risk and Information System Controls (CRISC), Certified Information Security Manager (CISM), and others. There is so much technology that we are inundated with more information than we can use. Because the information is being generated by a machine, we generally trust the computation (although there are cases where a bug in the program can even cause problems with simple math), but we also know the old saying, “garbage in, garbage out.” The computer does not always know that your typo is garbage. If you enter the wrong number, the system processes it as if it were the right number. That means we have to build some way into the program to control what is input into the system. For example, if you fill out a form online and it asks for your zip code, does it let you enter just four digits? No—the computer knows that it should only go to the next step if you enter five digits. However, you can enter the wrong digits and it might not catch it. It is critical that we build as many internal controls into our computerized systems as possible so that we can find errors at the input stage before they get into our system. In other words, by using these “preventive” controls, we do not allow “garbage” data to get into our system.

Computerized AISs have also brought changes to the audit trail. In the past, accountants had a set of books that were paper based. You could see where a transaction was recorded and posted (and see if it had been erased). Once you enter it into a computer, it becomes part of an electronic audit trail, but the trail is only as good as the program that runs it. The screen could show you one number, but the system could be working with a different number all together. In fact, there have been criminal cases in which people wrote programs to cover up fraud. One such program functioned so that when an item was scanned, the correct amount displayed to the customer, but it was recorded in the books as a smaller amount, so the company paid less in sales tax and much less in income tax.

AISs have become more important because information and technology are more important.

Concepts In Practice

Is Technology Always Better?

Technology allows one person to do a job that once took a dozen people to do. However, that can also lead to problems. For example, years ago, one person working in the accounts receivable department at Burlington Industries would have been in charge of a few customers. If those customers were not paying their bills on time, a person would be aware of it. Today, one person might be in charge of all accounts receivable. That person may not have time to call individual customers, so everything is preprogrammed. If the customer wanted to place a large order that caused them to go over their limit, the software would deny it instead of having a person weigh the risk of extending more credit.

A risk inherent in an AIS is that one person has access to a lot of information, and sometimes the information crosses department lines. Companies have to figure out ways to mitigate the risk, because AISs are truly essential to businesses today, especially with the growth of e-business and e-commerce. Think of the different business processes when a purchase is made through Their AIS must be able to access inventory records, access customer information and records, process credit cards, calculate delivery dates, handle coupons or discounts, and remember where to ship the goods. Amazon would not be what it is today without all of its systems working together. Seeing what Amazon has accomplished opens the door for other companies to follow, and they will need people who understand the system.

Forensic accounting involves the use of accounting skills to inspect the accounting records in order to determine if fraud or embezzlement have occurred. Many universities are offering forensic accounting degrees to prepare students who can testify to criminal activity present in the accounting records.

Concepts In Practice

The Founding of the Securities and Exchange Commission

In 1933 and 1934, the US Congress passed two acts that established the Securities and Exchange Commission (SEC), giving it the right to regulate and enforce the regulations concerning commerce in the United States. The website of the SEC ( allows you to view all public company financial reporting and provides a link to all current litigation against individuals and companies that have been accused of breaking an SEC regulation. If you go to the site and look for the Litigation Releases section, you can click on individual cases and find that some cases of fraud involve the use of an accounting information system.

The Patriot Act also came out of the 9/11 attacks (signed October 26, 2001). The letters in Patriot stand for the following: providing appropriate tools required to intercept and obstruct terrorism. The goal of the act was to prevent any other attacks on the United States by allowing enhanced surveillance procedures.

The act gave law enforcement officials the right to access computers to track IP addresses, websites visited, credit card information provided electronically, and so on, in an effort to uncover terrorism before an attack was made. Several parts of the act call for banks to report suspected money laundering activities. Money laundering is an attempt to hide the facts of the original transaction and would involve an accountant. If you were selling drugs for cash and then tried to deposit that much cash in a bank, the bank would report it, so you would try to cover up where the cash came from and run it through a legitimate company. That is money laundering.

The Patriot Act also includes a section requiring auditors to verify that a company has controls in place to prevent an attack on its accounting information system and that the company has a disaster plan including backup records in case of a disaster.

The AIS enables a company to record all of its business transactions. Systems are different depending on the company’s needs. The AIS holds a lot of the information used to run a business. One system can provide everything needed for external reporting to government agencies involving payroll and income taxation. The same system can provide the data needed for managerial analysis used for pricing, budgeting, decision-making, and efficiency studies. Every company is required to keep records of their financial activity, and this means job security for people who are knowledgeable about AISs.

Order a print copy

As an Amazon Associate we earn from qualifying purchases.


This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution-NonCommercial-ShareAlike License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at
Citation information

© Dec 13, 2023 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.