My Ssec Capstone Project STRATEGIC INFORMATION SYSTEM AND DECISION MAKING A CASE STUDY OF VISION FINANCE COMPANY LIMITED KIGALI BRANCH RUMONGI CHARLES MBA/0337/12 A Research Final Submitted in Partial Fulfillment of the Requirement for the Award in a Degree in Master of Business Administration

STRATEGIC INFORMATION SYSTEM AND DECISION MAKING A CASE STUDY OF VISION FINANCE COMPANY LIMITED KIGALI BRANCH RUMONGI CHARLES MBA/0337/12 A Research Final Submitted in Partial Fulfillment of the Requirement for the Award in a Degree in Master of Business Administration

STRATEGIC INFORMATION SYSTEM AND DECISION MAKING

A CASE STUDY OF VISION FINANCE COMPANY LIMITED
KIGALI BRANCH

RUMONGI CHARLES
MBA/0337/12

A Research Final Submitted in Partial Fulfillment of the Requirement for the Award in a Degree in Master of Business Administration (Strategic Management Option) of Mount Kenya University

FEBRUARY 2018

DECLARATION
This research study is my original work and has not been presented to any other institution.
No part of this research should be produced without the author’s consent or that of Mount Kenya University.

Student Name: Rumongi Charles
Sign………….. Date……………………….

Declaration by the Supervisor
This research has been submitted with our approval as the Mount Kenya University supervisor.

Name: Mr. Osiemo Kengere
Sign……………………… Date……………………..

Name: Dr David Nyambane
Sign……………………… Date……………………..

DEDICATION
This research is dedicate to my wife: UWIBAMBE Josiane and my children Rugwiro Daksha, Igabe Shalvin, Mugisha Joshua Ethan and my parents Mukazi Naome and Mugiraneza Emile the source of my inspiration.

ACKNOWLEDGMENT
With great honor I express my heartfelt gratitude to Mr. Osiemo Kengere who supervised me throughout the course of this study. His parental guidance and directions will not escape my memory.
I also express my honest thanks to my family whose incessant efforts made my dream come truth. His exceptional moral support, love and cooperation, deserve a high degree of appreciation.
Finally I salute my sister and all staff and members of vision finance company and my beloved comrades in the academic struggle, their melodies of victory, advice and encouragements, greatly facilitated me towards success of this academic research.

ABSTRACT
Management of Information Technology (IT) has been played role as a critical component of business performance.
Today information systems serves as the key role to many organizational transformations, therefore pressure goes on organizations to improve their investments in technology and information systems. Success comes when an organization is able to meet congruence between IS and organizational planning. And this is attaining when the technicians and managers of an organization work collaboratively.
It was in this line the study determined the important topic and suggests a process that assisted in the achievements of success, a case study of Vision Finance Company using strategic information systems as independent variable and decision making as dependent variable. Intervening variable is regulator of Vision Finance Company; it was seeking to address the following objectives; to examine strategic information system and decision making using a case study of Vision Finance Company as general objective where specific objectives are: to analyze the role of IT in decision making in VFC, to identify how IT can fight with competitive advantage in VFC, to identify other factors that constraint the implementation of strategic information system in VFC. This study is significant as was played a crucial role to the Management of Vision Finance Company in facilitating strategic information system implementation as this research will show its impact on decision making. The researcher was summarizing data using descriptive statistics. Data collection was done on primary and secondary data from Vision Finance Company, Primary data was collected through questionnaires of Vision Finance Company employees and employers. The researcher targeted the population of 110 and 40 was taken as the size of sampling. The techniques used in sampling for the study was sampled random. Interview was conducted and source was systematically organized in the manner that facilitates data analysis, analyzed and interpreted and tabulation was used. Most of the respondents agreed that strategic information system enhances better decision making. Hence, it was deduced from above response that strategic information system enhances better decision making. The study also concluded that strategic information system implementation at VFC was faced with many challenges. It is recommending the link of communication between managerial and non-managerial staff should be increased in order to support the flow of information and feedback mechanisms.

TABLE OF CONTENTS
DECLARATION ii
DEDICATION iii
ACKNOWLEDGMENT iv
ABSTRACT v
TABLE OF CONTENTS vi
LIST OF TABLES ix
LIST OF FIGURES x
LIST OF ACRONYMS AND ABBREVIATIONS xi
DEFINITION OF OPERATIONAL TERMS xii
CHAPTER ONE: INTRODUCTION 1
1.0 Introduction 1
1. 1 Background of the study 1
1.2 Problem statement 5
1.3 Objectives of study 6
1.3.1 General objective………………………………………………………………………………………………………..6
1.3.2 Specific objectives……………………………………………………………………………………………………..6
1.4 Research questions 6
1.6 Limitations of the study 7
1.7 Scope of the study 8
1.8 Organization of the study 8
CHAPTER TWO: LITERATURE REVIEW 9
2.0 Introduction 9
2.1Theoretical literature 9
2.1.1 IT strategies……………………………………………………………………………………………………………….9
2.1.2 IT procedures…………………………………………………………………………………………………………..10
2.1.3 Data integrity……………………………………………………………………………………………………………11
2.1.4 Management information system……………………………………………………………………………..11
2.1.5 Information and data management…………………………………………………………………………..12
2.2 Empirical literature 12
2.3 Critical and Gap review 15
2.4 Theoretical framework 16
2.5 Conceptual Framework 20
? Policies and procedure…………………………………………………………………………………………………..21
? Data integrity…………………………………………………………………………………………………………………21
?Innovation……………………………………………………………………………………………………………………….21
2.6 Summary 22
CHAPTER THREE: RESEARCH METHODOLOGY 23
3.0 Introduction 23
3.1 Research design 23
3.2 Target population 23
3.3 Sample design 24
3.3.1 Sample sizes…………………………………………………………………………………………………………….24
3.3.2 Sample technique……………………………………………………………………………………………………..24
3.4 Data Collection Instrument 25
3.4.1 Secondary source of Data…………………………………………………………………………………………25
3.4.2 Primary source of data……………………………………………………………………………………………..26
3.5 Data Collection Methods 26

3.5.1 Interview………………………………………………………………………………………….……………………….26
3.5.2 Questionnaires……………………………………………………………………………….………………………….26
3.5.3 Observation……………………………………………………………………………………………………………..27
3.6 Reliability and validity. 27
3.7 Data analysis procedure. 28
3.8 Ethical considerations. 28
REFERENCES. 49
APPENDIX ONE : COVER LETTER 52
APPENDIX TWO: QUESTIONNAIRE FOR VISION FINANCE COMPANY 53
APPENDIX THREE: INTERVIEW GUIDE 58

LIST OF TABLES
Table 3.1: Population and sample size 23
Table 4.1: Distribution of Vision Finance Company employees by age group………………28
Table 4.2: Distribution of Vision Finance Company employees’ level of education ……….29
Table 4.3: Distribution of respondents by working experience…………..………………….29
Table 4.4 showing the distribution of Vision Finance Company employees by their gender…………………………………………………………………………………………30
Table 4.5 showing how long respondents have been in Vision Finance Company as managers…………………………………………………………………………………….31
Table 4.6 Do you share passwords and accounts to one another? ………………………32
Table 4.7 as per the IT policy, are you encouraged and advised to change password after certain period of time? ………………………………………………………………………32
Tables 4.8 do all PCs, laptops and workstations should be secured with a password-protected screensaver? …………………………………………………………………………………33
Table 4.9 Do employees use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code?……………………………………………………………………………………………………………………….34
Table 4.10 Do IT Management recommend that any information that users consider sensitive or vulnerable be encrypted? …………………………………………………………………35
Table 4.11 Do you use email addresses provided by the company on unofficial web services such as social networking sites? …………………………………………………………….35
Table 4.12 Do employees engaged in any blogging that may harm or tarnish the image, reputation and goodwill of Vision Finance Company and any of its employees?………….36
Table 4.13 Do making fraudulent offers of products, items, or services originating from any Vision Finance Company IT policies prohibit?…………………………………………………………37
Table 4.14 shows how employees of Vision Finance are aware about Information ……39
Table 4.15: To what the extent does management make IT policies of VFC? ……………40
Table 4.16: What is the frequency of preparing IS policies implementation in Vision Finance Company? ……………………………………………………………………………………40
Table 4.17: What is the practice of IT policies and data integrity used in Vision Finance Company…………………………………………………………………………………….41

LIST OF FIGURES
Figure 2.1: Conceptual Framework 15

LISTS OF AN ACRONYMS AND ABBREVIATIONS
ATM : Automatic Tailor Machine
E-BANKING : Electronic Banking
CPU : Central Processing Unit
IT : Information Technology
MIS : Management Information System
PC : Personal Computer
SMES : Short and Medium Enterprises
UPS : Uninterrupted Power Supply
VFC : Vision Finance Company
IS : Information System
DSTV : Digital Satellite Television
SIS : Strategic Information System

DEFINITION OF OPERATIONAL TERMS
Strategic Information System: describe as systems that merge a technology in business with strategic planning to create a structure to better plan and execute objectives and improve responses to changing market conditions.
Electronic banking: Refers to the use of technology as delivery mode for the provision of services like opening a deposit account, electronic bill payments, and online transfers.
Mobile Banking: This is the product that allows customers of a Bank to access services everywhere. customers are able to have their account information with their mobile telephones like Balance enquiry, account management, SMS alerts for every transaction made on customers account, transfer between accounts, airtime purchasing, TV subscription like DSTV, star times. Etc…
Web banking: This is a product that enables the Bank leverage on the internet through Bank website system modeled in built on the new banking Application implemented by the banks to serve the internet banking needs of the bank’s customers.
Profit maximization: is defined as the process that companies undergo to determine the best output and price levels in order to maximize its return. The company will adjust influential factors such as production costs, sale prices, and output levels as a way of reaching its profit objectives.
Information: is a set of possible messages, where the goal is to send these messages over a noisy channel, and then to have the receiver reconstruct the message with low probability of error, in spite of the channel noise.
Policies: are like guidelines where representing citizens, businesses, or communities to adopt certain practices.
MIS: those are the process, store, and transmit information that supports Antitrust Division operations for management and support, and historic mission-specific purposes.
Data integrity: define as regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery.

CHAPTER ONE: INTRODUCTION
1.0 Introduction
This Chapter introduces the study by giving background information, statement of problem, objectives of the study, research questions, and scope of the study.
1. 1 Background of the study
Information systems have been around since the beginning of time. Information technology (IT) is a relative newcomer to the market. The facilities given by such technology have a major impact on individual, organizations and society.
An organization may take IT as unwanted, while others take it as a major source of strategic opportunity. Seeking proactively to identify how IT-based information systems can help them achieve a competitive edge.
IT nowadays many people are using it, its use has spread throughout organizations at a high speed rate. Different categories in the management levels are now using IT where once its sole domain was at the operational level. The objective is not to improve the efficiency but also to increase business effectiveness and to help organizations being more strategically managed.
The speed change in IT causes uncertain business environment unpredictable. The Organization capacity to identify the relevant information needed to make important decisions are crucial, since the access to data used to generate information for decision making is no longer restricted by the manual systems of the organization. IT can record, synthesize, analyze and disseminate information quicker than at any other time in history. Data can be assessing from different parts of the company and its external environment and bring together to provide relevant, timely, concise and precise information at all levels of the organization to help it become more efficient, effective and competitive.
Lack of full information-gathering capability of organizations, decision makers could seldom rely on up-to-date information but instead made important decisions based on past results and their own experience.
Information system strategy helps companies to line with latest information in terms of market, production, promotion of the products or services and the innovation that is associated with the business strategies. They also help users to underline the data collection procedures, thereby easing out the marketing opportunities.
By implement IS within the organization it helps to promotes how business is conducted according to a specific set of rules and guidelines. These guidelines will reduce the risk to the business: such as an information/data loss or potential damage to the company’s reputation. They will ultimately also reduce the cost of computing maintenance and network downtime.
IBS center for management research (2012). Found that management control should be integrated or in- build into organization’s activities that control system to influence the organization’s business operations.
Business today stimulate by technology the more technology the more the market loyalty and this contributes to the profit maximization, it is in this line that financial institution has chosen to use technology as the key factor to boost their profit.
According to Mohamed (2003). Strategy consists of planning or making decisions for the placement of resources over certain ground in order to accomplish long term goals.
According to Hitt,Ireland & Hoskisson (2005). Strategies are considered as one of the most important tools which an organization uses to sustain and maintain its success and profitability.
Managers in all organizations pass through difficult and complex situation in which they have to take decisions related on developing their business, and those decisions are based on strategic planning of organization (Mohamed, 2003).
Burgelman (2002).Stated that technology industries perform three important and inter-related activities: strategy, planning, and operation. Each operates in different intent and time horizon.
Vision Finance Company (VFC) is a subsidiary of World Vision and is one of the largest Microfinance Institution serving the rural communities in Rwanda, who does not be able to use financial services. VFC started in 1997 with the name of Vision Finance Company Limited (VFC) .As a Christian microfinance bank has been operating with Rwandans who are economically-active but whose banking needs are underserved.VFC was a microfinance under World Vision Rwanda and later registered as a separate program called Amizero (Hope) Microfinance in 1999. It was then incorporated as a limited Liability company (Society Anonym) in October 2003 and licensed as a regulated Microfinance Institution by the Central Bank in September 2004. Since then it became one of the largest regulated microfinance Institution in Rwanda today with branches in Kigali and in the provinces.
VFC aims are to provide opportunities for those in poverty to transform their lives, not only economically, but socially and spiritually. They offer a full range of deposit and savings accounts that provide a safe means for storing savings and earning interest.
As all operation firms, governmental organization and non-governmental organization in any country are expected to achieve successful their goals, such as outcomes of VFC are often linked to their planning process, specifically the development and implementation of a strategic plan.
1.2 Problem statement
In Rwanda MIS has been used in financial institution for achieving goals, making annual targets and defining activities to achieve them. The strategies of IS signs provide a clear framework to establish information accountability at a level directly relevant to technology. Some Banks have MIS in place but there are some banks and financial institutions who are not prepared very well on the issues of the strategic Information system and there are some banks who don’t know how to make decision based on strategies of information system and its implementation in general and specifically in VFC, therefore the aim of this research is to describe a simple model process by which strategy of IS comes to be defined and implemented and also helps to make decision. Clearly define the key dimensions of this process can allow executives to keep their hands precisely on those levels that control how strategy gets determined and put in place, and to improve the workings of the process as the competitive environment arise.
1.3 Objectives of study
1.3.1 General objective
The general objective of this study is to examine strategic information system and decision making using a case study of Vision Finance Company.
1.3.2 Specifics Objectives
The specifics objectives of this research are the following:
i. To analyze the role of IT of decision making of VFC.
ii. To identify techniques of which IT brings of competitive advantage in VFC.
iii. To identify other factor that constraint the implementation of strategic Information system in VFC.
1.4 Research Questions
i. What are the roles of IT of decision making in VFC?
ii. In which techniques does IT bring of competitive advantage in VFC?
iii. What is other factors that constraint the implementation of strategic Information system in VFC?
1.5 Significance of the study
This study was useful by contributing to the body of knowledge. This study was played a crucial role to the Management of Vision Finance Company in facilitating IT strategy policy implementation as this research will show its impact on profit maximization and internal control efficiency. This study will stimulate management control makers to adopt mechanism to boost technology considering it as the key maximization of the profit and quicker service delivery. The research findings were helping further the management team to remove barriers and to make policies that ease technology usage in Vision Finance Company. The study will be a tool for students, academic institutions, public and private institutions, private individuals in research about Strategic Information system and decision making in Rwanda.
1.6 Limitations of the study
The study focus is only on impact of decision making on strategic Information system, during the study the research is limited to a certain number of population because it cannot be possible to reach everyone in the VFC.
The language challenge, because of the respondent in the study area are not familiar with English language to easily respond to the research questions, to overcome this challenge the researcher was obliged to translate the questionnaires.
1.7 Scope of the Study
Content scope
This study was intended in finding out an impact of decision making on strategic information system precisely in VFC.
Geographical scope
The study was carried out in Rwanda in one of its districts which is Nyarugenge-Muhima sector.
Time scope
This research was focused on impact of decision making on strategic information system in VFC ranging from 2012 up to 2014.
1.8 Organization of the study
This study was of five chapters. Chapter one is about the introduction and the background, chapter two penetrate the review of related literature, theoretical literature, critical literature and summary included, and chapter three is on research methodology chapter four presents the research findings and discussion of data collected in the fields’ survey. Chapter five captures the summary of findings, conclusions and recommendations.

CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction
This section takes into consideration the view of different academicians, scholars researchers who made research on strategic IS and decision making. The research further looks at an empirical review, critical review, research gap to be filled by this study, conceptual framework of this research and summary.
2.1Theoretical literature
2.1.1 IT strategies
IT strategies are that used in technology with structure to create a better plan and execute objectives in order of improving responses to changing market conditions.
Information systems are considered on as support activities to the business. They help operations for better efficiency, control, and effectiveness, but they do not, in themselves, increase corporate profitability. They provide to the management sufficient dependable information to keep the business running smoothly, and useful for analysis to plan new directions. Strategic information systems become an integral and necessary part of the business, and they affect the profitability and growth of a company. They open up new markets and new businesses.
Different organization needs to protect its data by using information system where need to be encrypted and also help to control how it should be distributed both within and without the organizational boundaries.
2.1.2 IT procedures
IT procedures are rules governor in every enterprise, explain how these some rules are practically applied in real life, set expectations for the conducted and activities, as well as provide mechanisms to enforce these expectations. They should be conscientiously crafted in order to withstand both time and scrutiny. IT Procedures in the manual are categorized into five critical areas of Information Technology Management :(a) IT Administration Policies,(b) IT Asset Management Procedures,(c) IT Training, Incident Handling and Technical Support Procedures,(d) IT Security and Disaster Recovery Procedures,(e) Software Development Procedures (Dejan, 2016).
According to Neil (2014) stated that any unintended change to data as the result of a storage, retrieval or processing operation including malicious intent, unexpected hardware failure and human error is a failure of data integrity.
2.1.3 Data integrity
Data integrity is defined as imposed within a database at its design stage through the use of standard rules and procedures, and also maintained through the use of error checking and validation routines (business dictionary, 2003).
Data integrity is the opposite of data corruption, which is a form of data loss. The overall intent of any data integrity technique is to ensure data is recorded exactly as intended such as a database correctly rejecting mutually exclusive possibilities and upon later retrieval. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties (business dictionary, 2003).

2.1.4 Management information system
Management information system define as signs and implement procedures, processes, and routines that provide suitably detailed reports in an accurate, consistent, and timely manner.
Management information system allows modern and computerized systems continuously gather relevant data, both from inside and outside an organization, and then processed, integrated, and stored in a centralized database or data warehouse where it is constantly updated and made available to all who have the authority to access it, in a form that suits their purpose (Margaret, 2014).
A management information system (MIS) is computerize database by which financial information are organize and programmer in such a way that it produces regular reports on operations for every level of management on the company. It is also possible to obtain special reports from the system easily. The main purpose of the MIS is to give the managers feedback about their own performance and top management can monitor the company as a whole (Margaret, 2014).
2.1.5 Information and data management
Information and data management (IDM) are defined as policies, procedures, and the best practices to ensure that data is understandable, trusted, visible, accessible, optimized for use, and interoperable.IDM are the processes for strategy, planning, modeling, security, access control, visualization, data analytics and quality.
2.1.6 Strategic planning
Strategic planning allows governments, communities, organizations and even individuals deal with change and adapt to it. Strategic planning is intended to strengthen an organizations’ capacity to adapt to change and to enhance the ability of organizations’ members to think, act, and learn strategically to face continual environmental and institutional changes (Bryson, 2004).
2.2 Empirical literature
IT in Rwanda is used in terms of positioning and structuring the economy for long term economic transformation. However there are challenges remain including a large trade deficit, low added value of manufacturing sector and dependency of external aid. By addressing these limitations there is a crucial in both the short and long term in order to achieve sustained economic transformation (Dickson, 2012).
Past 20 years technology has been connecting the dots between computers, data and the people who use them. IT has been able to focus on the specific contributions of technological inventions and advances to the industry as a key growth driver like digitization and the resulting growth in the amount of digital data created, shared, and consumed. Computer networks took IT from the accounting department to all corners of the enterprise; the World Wide Web allows IT to be all over of the globe and connecting millions of people. Interactive conversations by sharing of information among these millions replaced and augmented broadcasting and drastically increased the amount of data created, stored, moved, and consumed. Technology helps in specific function responsible for running the infrastructure but as the essence of their business, data and its analysis becoming their competitive edge (Fred, 2007).
Technology industries are generally performing three important and inter-related activities: strategy, planning and operations where each is having a different intent and time horizon. The function of strategy which has a time horizon of years is in general to set the long-term direction or position of the firm (Burgelman, 2002).
Therefore, there are several different types of strategies which are competitive strategy, technology strategy, product market strategy, financial strategy and supply-chain strategy.
In order the Technology Company to be successful all these strategies need to be aligned with each other and with the business goals of the firm. Competitive strategy is the highest level of strategy in the firm and is intimately relate to the mission and vision of the firm and also setting the direction for all the other strategies in the firm.
Bakar et al, (2011) .Studied the practice of strategic management in construction companies in Malaysia. The findings of the research showed that most of the firms practicing strategic management had a clear objective, a winning strategy to achieve the objective and a sound mission statement to guide the organization towards success.
Pappas et al (2007). Stated the joint influence of control strategies and market turbulence on strategic performance in sales-driven organizations. Results from the survey of sales- driven organizations indicated that self, professional, activity, and output control systems had varying effects on participation in strategic activity.
Mintzberg and his colleagues (1998) in their research on strategy safari found out that strategy making is important for high-technology companies. On the other hand, they discovered that the marketplace must be competitive. Strategy is a generic position in the market place and strategy formation is the selection of a generic position based on analysis. Consequently, the industry or market structure drives position by which drives the organizational structure of the firm.
2.3 Critical and Gap review
A significant volume of research has been conducted on the field of computer human interaction and even in decision making. Most of the studies have experimentally determined how decision making affects the strategic information system and recommended possible design factors to be considered.
However in the volume of available literature there is still scarcity in the relationship between strategic information system and decision making. Nasanen and Ojanpaa (2003) and subsequent studies concentrated on the effect of graphical object’s contrasts on speed of search of specified icon and not on how it motivated the user to use the systems.
Research made by Thompson (2001), about strategic planning indicated that strategic planning provides meaning for allocating resources in complex multiproduct organization and approved four purposes related to the company size that is guiding company operations, examining the problems of company, ensuring better allocation of resources and assuring unified opinion among top executives.
The study made by Thune and House (1970) was to compare the impact of formal and informal strategic planning on decision making about 36 US companies. The comparative study about every company concluded that formal planners outperformed the informal planners in all decision making strategies that were used. And the conclusion was that the organization that making decision based on formal planning is more likely to achieve desired goals and objectives where as the informal planner organization will have difficulties in achieving organization goals and objectives.
The current study aims to investigate the impact of strategic information system on the decision making. The decision making was determined by the level at which the strategic was willing to use information system for data entry, retrieval of data, report generation and securing data. The cited studies have concentrated on an experimental design that controlled the environment in which the subject was studied. Such environments make the respondent aware of the study objectives and may act in a predetermined manner. The study therefore was designed to utilize descriptive methods and only to examine the dependent and independent variables and then try to mathematically analyze the relationships. This eliminated the respondent tendency to behave as to please the researcher hence making the results more authentic.
Moreover, there was no evidence that a similar study has been conducted in Rwanda though the country strategically adopted the implementation of strategic information system and decision making at all levels including the incorporation of smart policies in VFC. The current study bridges the gap by studying the impact of strategic information system on decision making in VFC of Rwanda.
2.4 Theoretical framework
2.4.1 Technology
Technology has played a role of changing work conditions by increasing the level of automation. From a psychological point of view automation is defined to be the “technisation” of human operations. But although operations may be carried out by a machine (e.g. technisation of mental processes), they still realize the action and its goal of the subject. Action and operations do not constitute any kind of separateness in relation to the activity (Gould ;Verenikina, 2003).
Computer systems should support both internalization of new ways of action and articulation of mental processes, when necessary, to facilitate problem solving and social coordination.
2.4.2 Technology Acceptance Model
Fred Davis (1989; 1993) .Presented the technology acceptance model based on theory of reasoned action to better explore acceptance of information system (IS). Davis found that perceived usefulness is one of the reasons a user will accept or reject a system and the other is perceived ease of use, which is the easiness or free of effort the user interpret the system.
It may be sound that the theory is an old theory in a rapid change area as information technology, but it is still used and valid, although there trends in to diversify the research where task-related information system is one and the other two are e-commerce and hedonic IS, for example online gaming and surfing (Hsiaoa, Hua, ; Yanga, 2011 ).
2.4.3. Unified Theory of Acceptance and Use of Technology
The unified Theory and Use of Technology is the technology acceptance model formulated by Venkatesh and others in User of acceptance in information technology. Toward the Unified Theory of Acceptance and Use of technology has objective to explain user intentions to use an information system and subsequent usage behavior. The theory holds that four key constructs: performance expectancy, effort expectancy, social influence, and facilitating conditions; being the first three direct determinants of usage intention and behavior, and the fourth a direct determinant of use behavior. Gender, age, experience, and voluntariness of use are posited to moderate the impact of the four key constructs on usage intention and behavior. The theory was developed through a review and consolidation of the constructs of eight models that earlier research had employed to explain information systems usage behavior, theory of reasoned action, technology acceptance model, motivation model, theory of planned behavior, a combined theory of planned behavior/technology acceptance model, model of personal computer use, diffusion of innovations theory, and social cognitive theory (Venkatesh and Bala, 2008).
2.4.4 The Survival Based Theory
This theory is based on view that organization needs to continue to adapt to its competitive environment in order to survive in long term that is why long range planning is highly required.
Therefore this theory is also relevant because one of the goals of VFC is to be strategically oriented and avoid haphazard development style with no clear path and goals (VFC, 2011).
2.4.5 Theory on policies
Policies are like guidelines where representing an opportunity to encourage citizens, businesses, or communities to adopt certain practices.
Pennsylvania State Universities (2015). Define two types of policies: Reactive and Proactive Policy. Where Reactive Policy is define as developed in response to a concern, problem, or emergency, it is designed to remedy problems that already exist. Reactive policy development often happens more quickly than proactive policy, as the problems can be pressing or even urgent. Reactive policy debate centers mostly on whether or not a certain policy mechanism is the best way to handle a situation, not whether or not the situation will ever become a problem. And Proactive policy is defined as deliberately chosen and often designed to prevent a concern, problem, or emergency from occurring. Proactive policies can be more challenging in that it is often difficult politically to get lawmakers to commit money and resources to a problem that has not yet occurred. Therefore this theory is also relevant because one of the goals of VFC is to be strategically oriented and have guided by policies and avoid haphazard development style with no clear path and goals (VFC, 2011).
2.4.6 Theory on data integrity
Data integrity is regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery.
Data integrity has changed the world of game programming to a different stage maybe the support at the earlier phase is not really satisfactory but it eases the amount of time programmers have to spend to code. Rather drilling down to the machine code or assembly language, accessing the API classes and methods really cut down the hassle of coding the game and it speed up the time taken for the development (Muadzir 2009).
Therefore this theory is also relevant because one of the goals of VFC is to be strategically oriented and have clear operation system (VFC, 2011).
2.4.7 Theory on MIS
MIS is defined as the process, store, and transmit information that supports Antitrust Division operations for management and support, and historic mission-specific purposes. Securing this information and assuring its proper use is critical to the success of these operations.
Thomas (2007) Stated MIS applications are secured via access authorization, authentication rules and audit controls. These technical controls are supplemented by procedural controls such as Account Management Reviews, Rules of Behavior, Confidentiality Agreements, and Security Awareness and Training to mitigate risks regarding unauthorized access and subsequent potential privacy violations.
Antitrust Division has consistently regarded the privacy ramifications of information which are the processed, stored, and transmitted on MIS as critical in supporting antitrust enforcement activities and executive operations and pursues its security objectives through application of FISMA requirements and industry Best Practices. Management review, continual enhancement, and continuous monitoring of MIS technical and procedural controls are of the utmost importance in protecting privacy information while also ensuring that Antitrust Division maintains continuity in its operations. Therefore this theory is also relevant because one of the goals of VFC is to be strategically oriented and having a clear working system (VFC, 2011).
2.5 Conceptual Framework
This research was carried out while focusing on the link between Strategic information systems on decision making in finance institution. This was served to test whether there is interdependence between Strategic information system and decision making. The result was revealing the significance of strategic information system to the vision finance company to decision making.

Independent variable Dependent variable
Strategic information system

? Policies and procedure
? Data integrity
?Innovation
?Strategy implementation
?Evaluation ; Control
?System and network activities
?Cost Leadership

Decision Making
?Best output
?Financial performance
?cost reduction
?Improves Internal efficiency

Intervening variables

Intervening variables

Source: Researcher
Figure2.1: Conceptual framework
This framework talk about the link between the dependent and independent variable, in our case the dependent variable is decision making which is linked to the strategic information system as independent variable. This linkage is to be explained as follows: Strategic helps in providing direction to organization members know where the organization is heading and where to expend their major efforts, it guides by defining the business of the firm, it seeks the ends and the means that it will use to accomplish those ends by define target values, performers strategies and compare measured results to the pre-defined standard by making necessary changes (Chrysler, 2012).
For strategic plan to be effective in an organization, the top management of the organization should provide leadership to the process.
As technology made company services easier so the management team can easily reach the target as to fulfill the objective of a company.
2.6 Summary
According to the data from different researcher in this section, Strategic information system made a significant role in decision making of vision finance company. Therefore despite its pitfalls like lack of more knowledge in IS, security risk, and lack of employee’s electronic awareness and other pitfalls discussed above information system is the leading advantage in high competition of financial institution in Rwanda especially in company’s sector.

CHAPTER THREE: RESEARCH METHODOLOGY
3.0 Introduction
This chapter presents research methods the researcher was used in carrying out the study as it concerns the overall approach to the research process, including the design of research, population that are targeted , sample size, sample design, data collection techniques, data analyzed data procedure and ethical to be considered.
3.1 Research design
Descriptive research design was used in this study and it helped to determine the impact of strategic information system on decision making. According to Howell (2005) stated that a study is concerned with finding what, where and how of a phenomenon.
3.2 Target population
Mugenda (2003) .Found population was defined to as a complete set of individuals; cases or objects with some common observable characteristics. A particular population has some characteristics that differentiate it from other populations. For this research, the population is made up of employees of the VFC in IT department as well as the management team. Altogether constitute a population of 110 of VFC employees and management team who use policies.
3.3 Sample Design
3.3.1 Sample Sizes
According to Kothari (2007).Sampling refers to the identification of group of individual or households or institutions or objects that can reach and possess the information relevant to the solving problem at hand.
This sample was employ to ensure that the different population elements under study are adequately represented. Due to limitation of resources researcher was used a sample size of 40 respondents where by 34 members are employees from vision finance company in IT department, and 6 are Vision Finance Company managers.
This are stated below; Let sampling error be 12%.
n= N/ (1+N. )
n= Size of sample
N= Total population
e = Error Tolerance which is 0 .12 (chosen by the researcher)
That is; N/ (1+N. )
110/ (1+110*0.12*0.12)
=40/ as sample size.
3.3.2 Sample Technique
This study has used a non probability sampling where purposive sampling procedure was used. Every member of population had equal chance to be included in sample. The purposive sampling procedure indicated that during sampling the researcher selected respondents basing on appropriate characteristic of sample who were more committed to strategic planning in chosen organization in order to serve a purpose of research. The following table summarizes the classification of respondents.

Table3.1: Population and sample size
Categories of members in VFC Total population Sample size

Employees of VFC 100 34
VFC managers 10 6
Total 110 40
Source: primary Data
3.4 Data Collection Instrument
3.4.1 Secondary source of Data
Secondary data is a source of information which refers to information gathered from sources that already exist like company annual reports, archives, government publications, company’s website, these documents in a nutshell are any written materials that contains information about the topic of this study precisely Strategic information system and decision making. These data will be obtained from books, magazines and other documents relevant to the study in case.
3.4.2 Primary data
Primary data are the information obtained first-hand by the researcher on the variables of items for the specific purpose of the study. Postal questionnaires can also serve as primary data source when questionnaires are administering over it.
Primary data was collected by using a questionnaire which was done at Vision Finance Company by the employees and management team.
3.5 Data collection methods
Data collection methods that used include interviews, questionnaires and library search documentary interview. A set of standard questions was used and was given to the respondents.
3.5.1 Interview
The interview refers to face to face conversation between the researcher and respondents.
Yogesh (2006). Defined interview as an administration of a questionnaire or schedule commonly referred to as face to face encounter. Interviews enable the researcher to get new ideas and responses in detail by providing good quality information. An interview schedule was used and IT policies implementation users in VFC was contribute to responders. Also in this study they were mostly considered as the main respondent to this material.
3.5.2 Questionnaires
This is one of the most data collections techniques which are used commonly to get more information about population. The researcher was used questionnaires as they were easy to administer and save time. This technique was been helpful to collect primary data on the survey based on self administered structured questionnaires with mainly closed and opened ended questions. Two sets of questionnaires were administered: Questionnaire 1 for Vision Finance Company’s employees and questionnaire 2 for the sampled VFC using IT policies.
3.5.3 Observation
The researcher was used this method to analyze all technologies VFC uses in IT policies system and how it is related to data integrity of MIS of the vision finance company. The researcher was intend to observe some challenges that both manage and VFC and how they overcome, especially in advancing IT policies implementation and data integrity of management information system.
3.6 Reliability and validity
Reliability is a measure of degree by which research instrument yields consistent results or data after repeated trials. Validity is the accuracy and meaningfulness inferences which are based on research results. Validity refers to the degree by which a study accurately reflects or assesses the specific concept that the research is attempting to measure (Bernheimer, 2008).
Keeves (1998) stated that valid instrument is an essential factor for successful scientific study.
It also refers how accurately a scientific investigation is carried out and how accurate the instrument and methods are. A Construct validity was based on the fact that questionnaire are content valid and this was achieved through a pilot study where the researcher was first test the questionnaires with at least five members from the main respondents in VFC before going into data collection.
3.7 Data analyzed procedure
Data analyzed is a process of administrating and modeling data with the aim of highlighting information used, suggesting conclusion and supporting decision making. The important here is that questionnaire have been administered and the mass of collected raw data was systematically organized in a manner that facilitated analysis. Also data was analyzed using descriptive statistics. Research findings were then presented thematically taking into consideration research objectives. The analysis was based on the figures assigned a weighted value to the extent of agreement for factors and level of ranking of performance.
3.8 Ethical considerations
The data collection was done on voluntary and the responders were involved based on their own active involvement and they were given the freedom of speech without any influence , The researcher was assured to work in perfect harmony with everybody who were contribute directly or indirectly to this study in order to obtain useful information.

CHAPTER FOUR: PRESENTATIONS, INTERPRETATION AND ANALYSIS OF THE FINDINGS
4.0 Introduction
This chapter presented empirical findings in reference to Strategic information system and decision making, it gives the demographic outline of the sample and cumulative information regarding to the responses from questionnaires. The researcher involved in questionnaires, 34 questionnaires were issued to Vision Finance Company employees 29 were returned and 5 were not returned, Questionnaires issued to Vision Finance Company managers were 6 and all were all returned thus the response rate was 86.4%.
4.1 Presentation of findings
This part describes the background of respondents according to, age group, gender sex, level of education and working experience in Vision Finance Company for employees.

Table 4.1: Distribution of Vision Finance Company employees by age’s categories
Age group of VFC employee Frequency Percentage
Under 25 years 2 6.8
Between25-30 years 10 34.48
Between 31-35 years 13 44.82
Between 36-45 years 4 13.79
Above 45 years 0 0
Total 29 100
Source: Primary source
Illustrated in Table 4.1, age group of 31-35 years took the largest portion with 13 respondents out of 29 (over 43%) while the least age group was under 25 years which took portion of 2 respondent out of 29 (less than 7%). as per cumulative percentage the majority of the respondents are below 40 years which explains that in Vision Finance Company precisely in IT department there are many young employees because young generation is very familiar with technology based services when compare to old people. This make company service delivery efficient and very fast and it is obvious that young employees are more productive especially in digital based services and policies.

Table 4.2: Distribution of Vision Finance Company employees’ level of education
Education achieved Frequency Percent
secondary
University 2
24 6.89
82.75
Masters 3 10.344
Total 29 100
Source: primary data
As illustrated in Table 4.2 the University level is the dominant as it takes 24 out of 29 (over 80%) and Masters takes the remaining takes 2 out of 29 (over 8%), secondary takes 2 out of 29(less than 6%) This is the evidence that shows that in Vision Finance Company they are fully educated to serve customers needs.
Table 4.3: Distribution of respondents by working experience
How long have you been a VFC employee? Frequency Percentage
Less than 1 year 1 3.44
1-2 years 10 34.48
3-4 years 10 34.48
5-6 years 0 0
Above 6 years 8 37.5
Total 29 100
Source: primary data
As illustrated in Table 4.3 most of respondents are seniors in the company and they are well experienced because more than 70% of them have spent more than 1 year in VFC, which convinces without any hesitation that they know what they do and their productivity is expectedly to be more and more considerable within the time which contributes to profit maximization and company’s policies.
Table 4.4 showing the distribution of Vision Finance Company employees by their gender
Gender Frequency Percentage
Male 14 48.27
Female 15 51.72
Total 29 100
Source: Primary data
As illustrated in Table 4.4 Vision Finance Company employees who responded to questionnaire are dominated by females who take portion of 15 respondents out of 29 (over 50%) and males the remaining portion of 14 respondents out of 29 (over 45%).

Table 4.5 Showing how long respondents have been in Vision Finance Company as managers
Years Frequency Percent
Less than 1 year 1 3.44
1-2 years 10 34.48
3-4 years 10 34.48
5-6 years 0 0
Above 6 years 8 27.58

Total 29 100

Table 4.5 illustrates the period by which respondents work with VFC as managers, as it is illustrated more than 50% of respondents spent more than 1 year as VFC managers which shows that managers has been established policies of VFC services and they are still enjoying working with VFC as it keeps coming up with innovation to over satisfy their customers by easing service delivery using technology and policies.

4.2 Information Technology Policies
Table 4.6 Do you share passwords and accounts to one another?
Responses Frequency Valid Percent
Yes 28 96.551
No 1 3.448
Total 29 100

Table 4.6 illustrates and explains the extent at which employees are safe using electronic password, and the huge majority said that it is safe using electronic password 28 respondents out of 29 (96.551%) confirmed the safety of electronic password.
Table 4.7 as per the IT policy, are you encouraged and advised to change password after certain period of time?
Response Frequency Percentage
Yes 27 93.10
No 1 3.448
I don’t know 1 3.448.
Total 29 100
Source: Primary data
As illustrated in table 4.7 from the point of view of sampled respondents who works in Information technology department policies has been more and more efficient through electronic password as 27 respondents out of 29 (over 87%) strongly agree that changing electronic password after a certain period of time made company IT more efficient and secure the rest of respondents disagree at the portion of 1 respondent out of 29 (over 3%).and 1 out of 29 they don’t know and nobody is encouraged them to change password.
Tables 4.8 do all PCs, laptops and workstations should be secured with a password-protected screensaver?
Response Frequency Percentage
Yes
28
96.5

No

I don’t know 1

0 3.448

0
Total 29 100
Source: Primary data
Table 4.8 illustrates how respondents use more password protected screensaver by securing them but the reason behind this is that PCs, laptops and workstations are accessible every time than it is with internet connection. So this table shows that employees are most likely using secured password as 96.5% of respondents prefers using secure password policies but only 3.44% unlike using secured password.

4.3 Data Integrity of Management Information System
Table 4.9 Do employees use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code?
Response Frequency Percentage
Yes 7 24.137
No
I don’t know 7
15 24.137
51.724.
Total 29 100
Source: Primary data
Table 4.9 illustrates challenges faced by Vision Finance Company on data integrity of management information system, and this shows that the problem that is most likely is they don’t know how to use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code as 51 % of respondents. Which shows that the main issue is employees they aren’t away of following that policies and is still challenging.

Table 4.10 Do IT Management recommend on information that users consider sensitive or vulnerable be encrypted?
Response Frequency Percentage
Yes 13 44.827
No
I don’t know 5
11 17.24
37.93
Total 29 100
Source: Primary data
Table 4.10 illustrates challenges faced by Vision Finance Company employees on IT Management, as the table shows it, on employees side show that information users consider as sensitive or vulnerable to be encrypted is still a big issue as 54% of respondents said another issue that respondents stressed is not well recommended.
Table 4.11 Do you use email addresses provided by the company on unofficial web services such as social networking sites?
Response Frequency Percentage
Yes 1 3.448
No
I don’t know 26
2 89.65
6.89
Total 29 100
Source: Primary data
As illustrated in table 4.11 employees are aware of how not to use email addresses provided by the company on unofficial web services such as social networking sites.
They are proud of that because they can over control their account wherever they are. The majority of respondents (89%) responded No to confirm that they don’t use email addresses provided by the company on unofficial web services such as social networking sites?
Table 4.12 Do employees engage in any blogging that may harm or tarnish the image, reputation and/or goodwill of Vision Finance Company and/or any of its employees?
Response Frequency Percentage
Yes 1 3.44
No
I don’t know 21
7 72.413
24.137
Total 29 100
Source: Primary data
As illustrated in table 4.12 employees that haven’t been engage in any blogging that may harm or tarnish the image, reputation and/or goodwill of Vision Finance Company and/or any of its employees, as it takes 21 respondents out of 29 (over 70%) and 1respondents out of 29 (3.4%) was engage in any blogging that may harm or tarnish the image, reputation and/or goodwill of Vision Finance Company and/or any of its employees. Where 7 out of 29 they do nothing either engaged or not engages in any blogging that may harm or tarnish the image, reputation and/or goodwill of Vision Finance Company and/or any of its employees.
This is the clear evidence that shows the strength of IT policies and how it contributes to employee’s loyalty which is directly related to profit maximization because employee is the central key towards profit maximization. It is in this line that we can say without any hesitation that an information technology policy has contributed massively to data integrity of management information system in vision finance company.
Table 4.13 Do making fraudulent offers of products, items, or services originating from any Vision Finance Company account IT policies prohibit?
Response Frequency Percentage
Yes 17 58.62
No
I don’t know 10
2 34.48
6.896
Total 29 100
Source: Primary data
Table 4.13 illustrates how long respondents have been using policies, as it is illustrated as time goes on IT policies users are more and more increasing, only 17 respondents out of 29 (about 60%) were using IT and making fraudulent offers of products, items, or services originating from any Vision Finance Company account IT policies prohibit.
4.4 Information Technology Policies of Vision Finance Company
Are you aware of the following Vision Finance Company IT Policies and Procedures?
(a) Do not write passwords down and store them anywhere in your office. Do not store passwords in a file on any computer system without providing the protection of a strong password on the file.
(b) Do not share passwords with anyone, including your manager, administrative assistants, or family members. All passwords are to be treated as sensitive and confidential information.
(c) Don’t reveal a password over the phone or in an email message to anyone. An exception to this is Helpdesk personnel who may, after obtaining valid identification, disclose a temporary password over the phone to a customer.
(d) Don’t talk about a password in front of others.
(e) If a password is found to have been compromised, immediately claim the incident to IT Department and change the suspected area.
(f) Passwords must not be inserted into email messages or other forms of electronic communication. An exception is allowed only if the email is created and delivered with the delivery option Encryption enabled.
(g) All forms of password recovery, cracking, or guessing is prohibited except by a member of the Information Technology Department. An exception is allowed only for the process by which IT administrators replace forgotten passwords with new passwords.
(h) All employees who have been registered personal mobile device for business used stated that the business:
• All intellectual property created on the device are owned
• Can be able to access all data held on the device, including personal data
• Will always back-up data held on the device
• Will erase all data held on the device in the event of loss or theft of the device

Table 4.14 shows how employees of Vision Finance are aware about Information Technology Policies
Response Frequency Percent
Yes
No
I don’t know 21
3
5 72.413
10.344
17.24

Total 29 100

Source: Primary data
As it is illustrated majority respondents without any exception said that information technology policies and procedures are helping them and they know them well.
1. Please explain how policies system is useful in decision making:
-By providing accurate data and report.
-decisions are made based on policies of organization.
2. What measures has your organization put in place to improve the quality of IT policies?
-password protection, change request form, user access right request.
-increasing strong system and facilitate the users.
3. What evidence supports the existence of IT policies in VFC?
-electronic attendance list
4. To what the extent does management make IT policies of VFC?

Table 4.15: To what the extent does management make IT policies of VFC?
VFC employee Frequency Percentage
Under 15% 1 3.445
Between15-25 % 1 3.445
Between 26-50 % 1 3.445
Between51-75 % 5 17.241
Above 75 % 21 72.413
Total 29 100
Source: Primary data
As illustrated in Table 4.15 management team has a big role in making IT policies of VFC where 21 out of 29 respondent (72.413%) involving in policies making. Lead to strong foundation of the company because leaders make decision together for the sake of company. They are proud of that because they can over control their policies.
5. What is the frequency of preparing IS policies implementation in Vision Finance Company?
Table 4.16: What is the frequency of preparing IS policies implementation in Vision Finance Company?
Response Frequency Percentage
Monthly 4 13.79
Quarterly
Annually 3
22 10.344
75.86
Total 29 100
Source: Primary data
Table 4.16 illustrates and explains the extent at which employees and managers are preparing IS policies implementation in Vision Finance Company, and the huge majority said that it is annually preparation is made where 22 respondents out of 29 (75%%) confirmed the preparation of IT policies implementation in Vision Finance Company is done annually
6. What is the practice of IT policies and data integrity used in Vision Finance Company?
Table 4.17: What is the practice of IT policies and data integrity used in Vision Finance Company?
Response Frequency Percentage
Computerized 22 75.862
traditional
computerized and traditional 1
6 3.4450
20.69
Total 29 100
Source: Primary data
Table 4.17 illustrates and explains the extent at which employees are safe using IT policies and data integrity in Vision Finance Company, and the huge majority said that it is safe and is computerized 22 respondents out of 29 (75.862%) confirmed the safety computerized and a small number confirmed the practical is made by using computerized and traditional where 6 out of 29 (20%) confirmed it. And traditional system is done in VFC by 1 out 29(3.44%).
7. What is the contribution of Strategic information system and decision making in Rwanda by VFC?
If you agree mention these contributions:
YES. Those are: strong data center, data recovery, IT policies guide the usage of using data or any IT information, decision making using good data.

8. Does Vision Finance Company makes full disclosure of its IT policies to the public?
-VFC share IT policies to the public.
9. What are the ethical standards used by Vision Finance Company?: -improving children welfare, integrity, value people, responsive, committed to the poor, stewards
10. Suggest an ideal IT policies framework that would be followed by Vision Finance Company to provide better data integrity.
-daily control of users rights to the systems,
-increasing training to the staff about IT policies at least twice in year.
-to discuss with all department and hear what is missing in orbit system,
4.5 Summary of Research Findings
The researcher analyzed social demographic of respondents in relation to their age, education level, working experience, time spent as employees and managers in Vision Finance Company. The researcher looked at the efficiency of Strategic information system in rendering company services, how it eases company service delivery, its convenience, how it saves employees’ time; also the researcher analyzed the challenges faced by Vision Finance Company and management on Strategic information system adoption like technical complexity, connection issues, ethical and so on. Lastly the researcher presented the respondent’s view concerning the effect of Strategic information system and decision making in Vision Finance Company, main branch, respondent’s view was positive as they responded with unanimity that Strategic information system has a positive impact on decision making through profit earned from self ethical and conduct in company.
CHAPTER FIVE: SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS
5.0 Introduction
This chapter describes the summary of major findings used in chapter four and answers the questions from questionnaire of this study, it also deals with conclusion and recommendations designed to be taken into consideration when making decision and policies on how to adopt mechanisms that favors Strategic information system and decision making. Finally, suggestions on the same field are given for further research.
5.1 Summary of major findings
Decision making is having positive impact on profitability of the company because it facilitates company service delivery as employees are becoming more and more professionals. Strategic information system has made most of ethical and conducts. Employees will control their behaviors without direct intervention of company; it is found that it enhances the efficiency of Vision Finance Company service delivery; delivery channel was enhanced through Strategic information system, convenience, widely accessible and reliable services.
Findings from primary data showed that Strategic information system have contributed to the decision making of Vision Finance Company as it attracted more employees who wish to enjoy self service activities in company. On Vision Finance Company side Strategic information system eased working atmosphere because the cooperation between company and employees became tight and convenient, controller, and reliability of information is shared without any incompatibility. Another key point about Strategic information system on Vision Finance Company side is the conduct that is obtained from employees that contributes to the company’s portfolio which is directly related to profit maximization of the company.
Primary data were collected about the effect of decision making on efficiency of company service delivery; findings proved the contribution of Strategic information system on efficiency as it made a new shape of company service delivery, because of its convenience, fast and reliability. Information is shared regularly without physical contact of company and employees, employee is becoming more and more a professional as he or she controls his/her conduct, this was approved by respondents who strongly agreed that information made employees more efficient, (79% strongly agreed), about the awareness 72 % of sampled employees confirmed that they are safe and secured with information technology policies.
Challenges faced by Vision Finance Company management and employees on Strategic information adoption system over data decision making were discussed and primary data showed that there are some challenges that are faced by both the management and company employees, The researcher looked at the efficiency of IT policy implementation in rendering company services, how it eases company service delivery, its convenience, how it saves employees’ time; also the researcher analyzed the challenges faced by Vision Finance Company and management on IT policies adoption like technical complexity, connection issues, ethical and so on. Lastly the researcher presented the respondent’s view concerning the effect of Strategic information system and decision making in Vision Finance Company, main branch, respondent’s view was positive as they responded with unanimity that Strategic information system has a positive impact on decision making through profit earned from self ethical and conduct in company.
5.2 Conclusion
This study aimed at analyzing the impact of Strategic information system and decision making in Rwanda Company, case study of Vision Finance Company. Specifically the researcher examined the impact of Strategic information system and decision making service delivery, challenges faced by employees and the management of Vision Finance Company on strategic information system adoption and the contribution of Strategic information system and decision making.
A questionnaire were used as means of collecting data, they were distributed to a sample size 34 and questionnaires were issued to Vision Finance Company employees 29 were returned and 5 were not returned.
The findings of research showed that information technology policies played a crucial role on efficiency of company services delivery as it helps employees to become more professional on ethics to the company which increased the quality of company service delivery, information technology policies also serves as eased and reliable delivery channel. Challenges faced by employees and company management were also discussed like connection interruption and other disorganizations of the system, mitigation measure should be taken into consideration to overcome such issues. The study showed in deep how strategic information systems contribute to decision making through commission and employees attractiveness towards self service company.

5.3 Recommendation
Strategic planning of IT is an important key to the effectiveness of the whole implementation process system. Vision Finance Company, by lacking of a strategic plan for IT, runs the risk of investing in technologies, which, may not prove to be viable in the long term. In addition lack of a plan might foster other problematic issues. Failure to involve in a formal planning process for IT’s may ignore many of the factors which could enhance or hinder IT implementation. Planning can involve the technological infrastructure through needs assessment and support of IT goals throughout the organization. Strategic planning is critical to the effective design and implementation of information technologies within an organization. While it may seem to be a fundamental concept, “the potential for miss-assignment of tasks between people and IT’s in poorly designed systems may be at the bottom of much of the dissatisfaction with IT when viewed from most perspectives within an organization.”
In a large percentage of the market, technologies are described in oversimplified terms with regard to the complexities of implementing IT’s. Consequently, the need for careful analysis and planning of IT is underemphasized. Often individuals without a high level of expertise in this area are left with the impression that the effective use of IT is as simple as turning on a light. Strategic planning for IT implementation must be viewed by the organization and its administrators not as an option but as a necessity. To achieve this kind of commitment, significant changes in the organizational environment, including its leadership and management processes may need to be enacted. This perception of IT planning importance is really a top-down view of organizational goals. Successful Microfinance institutions in IT implementations have one thing in common: They all enjoy full and dedicated support from top management, including the chief executive and all major department heads.
IT implementation is a crucial undertaking of the organization and this brings a substantial investment of effort, time, and money. This necessarily involves firm backing and support of top management—not just at the outset, but from the initial planning stages through complete implementation. Organizational leaders must be committed to obtaining necessary funding, as well as taking an active role in the development and implementation of the systems. One of the most important factors is top chief executive participation, which is key to enhance departmental boundaries. Leadership at this point must deal with the ordering of internal conflict. Administrators have to be committed in dealing with the struggle among the competing IT needs and interests of diverse departments, and facilitate coordination of these in order to eventually make the best use of limited organizational resources.
The management of Vision Finance Company should enhance the technical quality of strategic information system to remove connection interruption in order to make company service more unbiased. The head of information technology should deal with the team in charge of policies to make permanent follow up about policies. Awareness should be revised to make it more affordable than it is today.
The Government of Rwanda should adopt policies and mechanism that encourages companies to use policies in their service delivery through information technology policies.

5.4 Suggestion for further studies
This study regarding on Strategic information system and decision making was not exhausted because it is only limited to the case study of Vision Finance Company, main branch. Further studies on the same field can be conducted on many finance companies.

REFERENCES
Bakar, A.H.A., Tufail M.A., Yusof, M.N & Virgiyanti,W. (2011). Implementation of Strategic Magement Practices in the Malysian Construction Industry. Pak.J. Commer. Soc.Sci, 5(1), 140-154
Bryson,M J. (2004). Strategic Planning for public and non-profit organization: a guide to strengthening and sustaining organizational achievement.3rd edition, San Francisco:Jossey-Bass
C.R.Kothar (2010) Rearch Methodology,Methods and Techniques ,Second Revised Edition. New Age International Publishers
Chrysler,C. (2012) The global marketing environment. Retrieved February 24.2013 from http://www.chrysler.com
Davis, F.D., Bagozzi, R.P., & Warshaw , P.R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Manage SCI, 35
Dejan Kosutic( 2016). Seven steps for implementing policies and procedures
Dickson, M. (2012) Report for the African centre for economic transformation
Government of of Rwanda (2010). Cocept paper on Imihigo Planning and Evaluation. kigali: Government.
Grinnel, R. (1990) Basics of qualitative research (3rd Edition). Peacock Publishes Inc.
http://www.businessdictionary.com/definition/data-integrity 2003
Hsiaoa, Hua, C., & Yanga, C. (2011) The intellectual development of the technology acceptance model:A co-citation analysis. International journal of information management,31, 128-136

Keeve. (1998) Natural intelligence in design study. London: Keeves.
Kent, W. & Paula, K. (2001).IT policy: an essential element of IT infrastructure.
Kothari, c.(2010) Research methodology. New Delhi: New edge international publisher.
Kothari, C.(2001) Research Methodology 2nd edition. New Delhi: New age International publishers.
Marmara University (2009) Determination of reason affecting the use of internet banking: Journal of global strategic management, vol.16, 68
Margaret, R.(2014) Management Information systems privacy impact assessment.
Ministere de l’Administration Local.(2013) Annual report, Retrieved on may 20 2014 http://www.MINALOC.gov.rw
Ministere de l’Economie et des Finances. (2013, march 15). minecofin corporatipon. Retrieved
october 1, 2014,
www.minecofin.gov.rw
Ministere de l’Economie et des Finances. (2014, march 15). minecofin. Retrieved march 2, 2014, www.minecofin.gov.rw
Mintzberg, H., Ahlstrand, B. and Lampel, J. (1998). Strategy Safari. New York:The Free press.
Muadzir (2009) Introduction of Direct X.
Njanike, K.(2010, February 25). MIS Quarterly. Retrieved on May 28, 2014, http://www.upet.ro/anale/economy/pdf
M. Mugenda and O.Mugenda. (2003). Research Methods Qualitative and Quantitative approaches revised.
Nasanen, R., & Ojanpaa, H. (2003) Effect of image contrast and sharpness on visual search for computer icons:Displays, 24, 137-144.
Neil ,W. (2014). Data integrity a modern day challenge:The journal issue 28, spring 2014.
Pappas J. M., Flaherty,K. E & HUNT, C . S. (2007) The Joint Influence of control Strategies and Market Turbulence on Strategic Performance in Sales-Driven Organization; Institute of Behavioral and Applied Management, 141-167
Rosemary F.(2014).Practical steps for implementing policies and procedures.
The Data Warehousing Institute (TDWI).(2014).accessed july 21.2014
Thepennsylvania State University (2015).College of earth and mineral science,type of policy.
Thomas King (2007). Management Information System (MIS).
Privacy Impact Assessment Prepared by United States Department of Justice
Antitrust Division.21-JUNE-2007
Yogesh, D. (2006) Research methods; New Delhi: New Age publisher.

APPENDIX ONE: COVER LETTER
Rumongi Charles
Mobile Number: +250736364700
24th March 2017
Dear Sir/Madam
RE: Request to participate in research study
I am a strategist who is interested in developing both the strategies management profession and my capabilities through research.
I am currently pursuing my master’s degree program in strategic management at Mount Kenya University which requires me to present a report on research conducted in my field.
For my research study, I am investigating strategic information system and decision making in your organization.
For each question there are number of option to pick. It requires ticking the most appropriated option in the adjacent box. The information that you provide shall only be used for study purposes and shall not be shared with anyone. The highest levels of confidentiality and ethics shall be maintained.
Should you be interested in the finding of the study, you may indicate your address at the bottom of the questionnaire and they shall be provided to you at the end of the study
Look forward to a positive response from you .
Yours faithfully
Rumongi Charles

APPENDIX TWO: QUESTIONNAIRE FOR VISION FINANCE COMPANY
Instructions
? Please help answering the following questions,
? Where multiple choice are provided you are required to tick in the box or circle the right answer,
? If not provided and where more clarification is required please answer the questions accordingly in the space provided.

1. Your job title/Position
2. Your gender
Male:
Female
3. Your age
Under 25
25- 30
31- 35
36-45
Above 45
4. Your level of education
Primary school
Secondary school
Bachelor’s degree
Masters
Doctorate
Others specify
5. Time you have spent in the organization
Less than 1 year
1-2 years
3-4 years
5-6 years
Above 6 years
6. Do you share passwords and accounts to one another?
Yes
No
I do not know
7. As per the IT policy, are you encouraged and advised to change password after certain period of time?

Yes
No
I don’t know
8. Do all PCs, laptops and workstations should be secured with a password-protected screensaver?
Yes
No
I don’t know
9. Do employees use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code?
Yes
No
Do not know
10. Do IT Management recommend that any information that users consider sensitive or vulnerable be encrypted?
Yes
No
I don’t know

11. Do you use email addresses provided by the company on unofficial web services such as social networking sites?
Yes
No
I don’t know
12. Do employees engage in any blogging that may harm or tarnish the image, reputation and/or goodwill of Vision Finance Company and/or any of its employees?
Yes
No
I don’t know

13. Do making fraudulent offers of products, items, or services originating from any Vision Finance Company account IT policies prohibit?
Yes
No
Do not know
14. Are you aware of the following Vision Finance Company IT Policies and Procedures?
(a) Do not write passwords down and store them anywhere in your office. Do not store passwords in a file on ANY computer system without providing the protection of a strong password on the file.

(b) Do not share passwords with anyone, including your manager, administrative assistants, or family members. All passwords are to be treated as sensitive and confidential information.
(c) Don’t reveal a password over the phone or in an email message to ANYONE. An exception to this is Helpdesk personnel who may, after obtaining valid identification, disclose a temporary password over the phone to a customer.
(d) Don’t talk about a password in front of others.
(e) If a password is suspected to have been compromised, immediately report the incident to Information Technology Department and change the suspected password.
(f) Passwords must not be inserted into email messages or other forms of electronic communication. An exception is allowed only if the email is created and delivered with the delivery option Encryption enabled.
(g) All forms of password recovery, cracking, or guessing is prohibited except by a member of the Information Technology Department. An exception is allowed only for the process by which IT administrators replace forgotten passwords with new passwords.
(h) All employees who have a registered personal mobile device for business use acknowledge that the business:
• Owns all intellectual property created on the device
• Can access all data held on the device, including personal data
• Will regularly back-up data held on the device
• Will delete all data held on the device in the event of loss or theft of the device

Yes
No
Do not know

APPENDIX THREE: INTERVIEW GUIDE

1. Please explain how policies system is useful in decision making.
2. What measures has your organization put in place to improve the quality of IT policies?
3 .What evidence supports the existence of IT policies in VFC?
4. To what the extent does management make IT policies of VFC?
Less than 15%
15%-25%
26%-50%
51%-75%
More than 75%
5. What is the frequency of preparing IT policies implementation in Vision Finance Company?
Monthly
Quarterly
Annually
6. What is the practice of IT policies and data integrity used in Vision Finance Company?
Computerized
Traditional
Both Computerized and traditional
7. What is the contribution of IT policies implementation and data integrity of Management Information System in Rwanda by VFC?
If you agree mention these contributions.
8. Does Vision Finance Company makes full disclosure of its IT policies to the public?
9. What are the ethical standards used by Vision Finance Company?
10. Suggest an ideal IT policies framework that would be followed by Vision Finance Company to provide better data integrity.

Thank you