An Information Professional
Khalid Asakir has earned a bachelor’s degree in Business Administration–Marketing from King Abdulaziz University, Jeddah, Saudi Arabia. During that time, he was also working at the Saudi Ministry of Justice. After graduation, he worked in Alinma Bank as a Teller at the beginning. It was very important for him to work in the cash area since it is considered as the heart of the operation system. After nine months, he was promoted to be a Relationship Officer. A year later, Mr. Asakir decided to earn a master’s degree in Information Management and an advance study in Information Security Management; therefore, he attended the School of Information Studies, which is ranked as top-school in Information Systems in the US. After two years, he has successfully obtained his master’s degree in Information Management and an advance certificate in Information Security Management. During his study at Syracuse University, he worked on many case studies in which real respectful companies faced challenging situations. These challenging situations include risk management failure, lack of forming proper strategic plans and methodologies, having out-of-control projects, and lack of accessing the important information for making decisions. Such challenges led these companies to face some obstacles in doing its businesses or at least they could not benefit from some of potential opportunities in the market. Mr. Asakir was responsible for facilitating these challenges and helps these companies to solve its problems as well as to prevent them from having such problems in the future. Additionally, he worked in some projects such as project management plan, risk management plans, biometrics as an improvement in security, security breaches analysis, Database– significant tool to improve businesses and decision-making process, Google’s approach to China–strategic Analysis, and Apple's trip from the bottom to the top– strategic analysis.
M.S. in Information Management2012 – 2014
(The School of Information Studies, Syracuse University; Syracuse, NY, The United States) Relevant Coursework:
Information Policy; Applied Information Security; Introduction to Information Management; Information and Information Environments; Enterprise Network Management; Data Administration Concepts and Database Management; Graphic Design for the Web; Management Principles For Information Professionals; Introduction to Information Security; Enterprise Risk Management; User-Based design; Managing Information Systems Projects; Strategic Management of Information Resources; Applied Economics for Information Managers
CAS in Information Security Management2012 – 2014
(The School of Information Studies, Syracuse University; Syracuse, NY, The United States) Relevant Coursework:
Introduction to Information Security; Information Policy; Applied Information Security; Data Administration Concepts and Database Management; Enterprise Risk Management
B.S.in Business Administration– Marketing2004-2008
(The School of Economics and Administration, King Abdulaziz University, Jeddah, Saudi Arabia) Relevant Coursework:
Principles of Business Administration; Computer Principles and Applications; Principles of Law; Principles of Microeconomics; Principles of Public Administration; Communication Skills; Commercial Law; Organizational Behavior; Principles of Marketing; Corporate Finance; Human Resource Management; Consumer Behavior; Management Information Systems; Operations Management; Distribution Channels; International Business Management; Local Administration Managers
@ Alinma Bank2010-2012 (Riyadh, Saudi Arabia)
In addition to opining and closing accounts, I was explaining and promoting the bank’s services to customers. I was referring customers to appropriate financial services including assessing and approving loan’s applications
@ Alinma Bank2009-2010 (Riyadh, Saudi Arabia)
I was a person who accepted deposits, paid withdrawals and cashed cheeks for customers. additionally, i was managing and issuing debit and credit cards. i was a member of a team that is responsabile for filling and checking the ATMs in the branch.
@ The Ministry of Justice2004-2009 (Riyadh, Saudi Arabia)
I was assisting judges in their work in cases. Also, I was writing and forming judicial decisions. I was working there while i was studying my bachelor's degree.
@ Lagoon Advertisement2003-2004 (Riyadh, Saudi Arabia)
I was working on designing posters, magazines, and websites. I was working with Adobe Photoshop very often, and sometimes I used Adobe Illustrator for creating logos.
The following projects were conducted when I was doing my master's degree at Syracuse University. Each project was developed based on real situations, at which these companies faced obstacles on doing its business. These projects provided recommendations to solve and prevent having similar problems in the future.
A Risky Decision Almost Destroyed Apple (Risk Analysis):
When a company removes an employee from his/her position, the company involves risk by making that decision. In 1985, John Sculley (the CEO of Apple at the time) decided to remove Jobs from his position as head of the Macintosh division. As a result, Jobs resigned from Apple. Between then and 1991, Apple had problems in the market, and from 1991 to 1997 Apple faced challenges that almost led it to bankruptcy. In 1997, Apple asked Steve Jobs to come back to the company in order to solve the problems that the company was experiencing. This project discusses: the risky decision that caused Apple’s failure in the period between 1985 and 1996, and its success since 1997 after managing the risk properly. After providing the strategies those were used in both aspects, this paper will analyze the successful methods that Steve Jobs used to recover and grow Apple.
Database– As a Tool to Empower Business and Decision-Making Process:
After implementing database system, the company will increase its revenue and prevent losses such as paying penalties for late-finished projects, losing current clients…etc. All departments should be involved in creating this system. At the end of testing the system, the benefits of the system will emerge and be realized from the employees and managers. The differences between the old system and the new one will be obvious. The new system support, but not limited to, retrieving the information in very short amount of time, and it is save data from being lost or getting worn-out. Thus, the company will have their source of information whenever they need a support for making such decisions. However, in the old system, the company was not able to access the information on the right time because the retrieving information was consuming long time regarding the paper work and hard copy storing of the data…. Having all those elements applied in the database system, the company’s problem will not be a problem any longer. The database system is the most appropriate solution for the company at the time.
Google’s Approach to China (Strategic Analysis):
Google is considered one of the biggest search companies not only in the United States but also in the world. Larry Page and Sergey Brin, who graduated from Stanford University, founded Google in 1998. Google was born as a search engine that gathers and organizes information on the Internet. Google has succeeded in attracting users quickly because of its simplicity, ease of use, fast response, and quality results. In 2000, the company provided searches in the Chinese, Japanese, and Korean languages. In 2001, the company went global for the first time when they opened an office in Tokyo, Japan. In 2004, Google acquired a worldwide market share of 85%. Google’s main source of profit is through advertising. Keyword advertisements (or what Google calls “AdWord”), which show advertisements that are related to search words, is one of Google’s targeted methods of advertising. This type of advertisement is always titled as “sponsored” to help users to distinguish between the advertisements and the research results. For example, when a user searches the word “shoes,” an advertisement for Aldo (a shoe company) might appear. John Quelch and Kathrin Jocz (2010) stated that Google generated 21.1 billion in revenue from advertisements in 2008. Moreover, the company entered the smartphone industry in 2005 when they introduced Android, the open-source smartphone’s platform. In 2010, the company introduced its first smartphone, called “Nexus One.” In addition, by 2009, Google’s search engine had offered its users the ability to search in more than 110 languages, and the company has had offices in many countries around the world (Quelch & Jocz, 2010, p. 2). Given the exceptional development of its business, Google is considered to be one of the largest companies around the world. However, Google’s decision to enter China became a controversial topic. Many people encouraged Google to enter the Chinese market; however, others suspected that Google would not be successful in China. This paper discuses and analyzes Google’s experience in China and provides recommendations for Google in regard to the China case.
Apple's Trip from the Bottom to the Top (Strategic Analysis):
Steve Jobs was one of the co-founders of Apple Inc. in 1976 in California. In 1985, John Sculley (the CEO of Apple at the time) decided to remove Jobs from his position as head of the Macintosh division. As a result, Jobs resigned from Apple. Between then and 1991, Apple had problems in the market, and from 1991 to 1997 Apple faced challenges that almost led it to bankruptcy. In 1997, Apple asked Steve Jobs to come back to the company in order to solve the problems that the company was experiencing. This project discusses: Apple’s failure in the period before 1996 and its success since 1997. After providing the strategies those were used in both aspects, this paper will analyze the successful methods that Steve Jobs used to recover and grow Apple.
Risk Assessment of Administrative Computing Services (ACS) at Syracuse University:
This project was done for ACS at Syracuse University as a risk assessment plan. Such plan was divided to three main sections: risk identification, measurement, and management. SOWT methodology was used as a tool for identifying possible risks; risk map was used to measuring and prioritizing the identified risks; risk portfolio was used a method for managing risk. Each risk has its own risk portfolio, which contain (1) the risk name, (2) risk rank, (3) causes, (4) best reaction when the risk occurs, (5) a person who is responsible for this risk …etc.
The Future of Biometrics (Security Analysis):
This project provides, analyzes, and evaluates different types of biometrics, including the recently discovered ones such as brain waives. Additionally, this project points for the best use for each type of biometrics. Such uses would play a massive role on developing security. Otherwise, the security system might suffer of misusing such technology.
Analysis of RSA’s Security Breach (Security Analysis):
RSA is a security organization that provides security solutions for some of the largest companies in the United States such as financial institutions and state defense companies such as Lockheed Mar. the target of the attacker was the seeds for the SecurID, which is a one-time password generator. This project analyzes this breach in more details including the method the attacker used to conduct this breach, the tools the attackers used to preform this attack, the result of this breach, the recommendations for prevent having similar attacks in the future.
Improving Security by Implementing Biometrics (Security Analysis):
This project provides solutions to improve (a bank) current security system by implementing biometrics. Such implementation would be processed according to advised steps. It is recommended that biometric authentication will be implemented at all access doors and computers. Installing fingerprints authentication system in the cash area, in the cards room, on all emergency doors, and on all computers is suggested. Additionally, this project suggests a hand-geometry authentication system at the treasury. Although biometrics is socially criticized as offensive and invasive, it is believed that it is analogous to the use of security cameras, and which is standard and commonly accepted by employees. Further, it is recommended a policy stating that the employees’ biometric data will only be used to manage access to limited and restricted areas, this will assure the bank’s employees that their privacy will be respected. In order to maximize the benefits of biometrics, training workshops to help the employees learn to use the new systems is significantly important.