Md Tarique Jamal Ansari

Md Tarique Jamal Ansari
Babasaheb Bhimrao Ambedkar University · Department of Information Technology

Doctor of Philosophy
Software Engineering, Cyber security, IT Management, Fuzzy Logic

About

28
Publications
14,778
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
382
Citations
Citations since 2016
28 Research Items
380 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
Introduction
I am currently involved in a research, in which we will design and develop a software security-durability mechanism. This mechanism aims to make Digital India Initiative more secure and can be used for quality improvement of software services for security-critical digital architecture in India. My research interest includes Security requirements engineering, Data privacy, Big data, Blockchain, Cloud security engineering, Risk management, Health informatics.
Education
August 2015 - August 2020
Babasaheb Bhimrao Ambedkar University
Field of study
  • Information Technology
July 2013 - July 2015
Babasaheb Bhimrao Ambedkar University
Field of study
  • Information Technology
July 2009 - July 2012
University of Lucknow
Field of study
  • Computer Applications

Publications

Publications (28)
Chapter
In India, e-governance has progressed from the computerized system of government units to programmes that encompass the finer elements of governance, including the citizen-centric approach, responsiveness, and accountability. Lessons learned from prior e-Government programmes have helped to shape the country’s advanced e-Government policy. Although...
Article
Full-text available
The majority of medical equipment in use today does not have built-in security features. As a result, whether linked to a hospital system or the cloud, these devices’ built-in weaknesses make them vulnerable to a variety of cyberattacks. In hospitals and clinics, hackers can breach equipment, manipulate data, and disrupt facilities, putting patient...
Article
Full-text available
In today’s age of information and communication technology (ICT), many companies are using advanced digital technologies as well as the application of information technology to grow the company and effectively manage their processes. The risk management of information technology plays a crucial role in protecting the important information and data...
Article
Full-text available
Generally, software developers make errors during the distributed software development process; therefore, software testing delay is a significant concern. Some of the software mistakes are minor, but others may be costly or harmful. Since things can still go wrong—individuals encounter mistakes from time to time—there is a need to double-check any...
Article
Full-text available
Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as privacy preservation, authenticity, and accessibility. To fight these risks, different organizations n...
Article
Full-text available
Adversaries always eager to take advantage of flaws in emerging healthcare digital solutions. Very few authors discussed durable application security. Therefore there is a need for a durable security mechanism that must be adequately efficient, reliable, and defend critical data in an emergency situation. It ensures that the application can be serv...
Article
Full-text available
A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the health-care industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to deter...
Article
Full-text available
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software's durability and security is a...
Article
Full-text available
One year during the pandemic of COVID 19, numerous viable possibilities have been created in worldwide efforts to create and disseminate a viable vaccine. The rapid development of numerous vaccinations is remarkable; generally, the procedure takes 8 to 15 years. The vaccination of a critical proportion of the global population, which is vital for c...
Article
Full-text available
Considering rising pollution as well as fuel expenses, it has now become critical to transition to a sustainable method of transportation. As a result, automakers have begun to spend on research and development in the electric vehicle (EV) industry. The amount of EVs has expanded rapidly in recent years. This is owing to new improved technology, pa...
Article
Full-text available
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of s...
Article
Full-text available
A secure, smart and peer-to-peer transactions framework can be developed by Blockchain. Blockchain has enormous potential to turn health care systems as a horizontal technology, which has changed many fields of industry. The aim of this article is to critically review 50 papers published between 2015 and 2020 on blockchain-based health systems. 36...
Article
Full-text available
The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online. The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it. To aid the law enforcement agencies in curbing the illicit trade of firearms on cryptomarkets, this paper has proposed an automated technique em...
Article
Full-text available
Data integrity continues to be a persistent problem in the current healthcare sector. It ensures that the data is correct and has not even in any manner been improperly changed. Incorrect data might become significant health threats for patients and a big responsibility for clinicians, resulting in problems such as scam, misconduct, inadequate trea...
Article
Full-text available
In recent years, numerous attempts have been made to enhance the living standard for old-aged people. Ambient Assisted Living (AAL) is an evolving interdisciplinary field aimed at the exploitation of knowledge and communication technology in health and tele-monitoring systems to combat the impact of the growing aging population. AAL systems are des...
Article
Implementing security and privacy requirements at every level of the software development cycle is imperative for ensuring optimum usability as well as the users’ satisfaction. Software development must consider and comply effectively with the risks involved in the privacy and protection of confidential data. This research study endeavors to integr...
Article
Full-text available
One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely...
Article
Full-text available
Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their compone...
Article
Full-text available
COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-to- severe respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medic...
Article
Full-text available
Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malware. Malwares are very vigorous and can penetrate the security of information and communication systems. While there are different techniques available for malware analysis, it becomes challenging to select the most effective approach. In this context, th...
Article
Full-text available
Background: Today's healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data. Considering security requirements during trustworthy healthcare software development process is an essential part of the quality software development. There are several Security R...
Article
Full-text available
Blockchain technology is among the most significant developments and revolutionary innovations of the Information Technology industry. It corners a crucial space in the present digital era and has already made significant differences in human life. Moreover, it is anticipated that the Blockchain technology will improvise the existing IT facilities...
Article
Full-text available
Security Requirements Engineering is one of the most important parts of the software development lifecycle that assist the software developer in developing a quality cost effective software application. Security requirements are the non-functional requirements which must be considered early in the software development lifecycle with functional requ...
Article
Full-text available
We are living in information technology era today, storage of paper based data is eliminated or greatly reduced. This is done by transforming documents and other paper based data into digital form. This process is known as digitization. Digital data security and privacy protection have become essential priorities in an increasingly digital and data...
Preprint
Full-text available
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more advanced concern. Both the functional and non-functional requirements are important and provide the...
Article
Full-text available
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more advanced concern. Both the functional and non-functional requirements are important and provide the...
Chapter
Big data has the potential to transform healthcare systems for the prevention and treatment of HIV/AIDS by providing analytic tools that are capable of handling huge and different types of data at very fast speeds. Big data's transformative potential is also introverted by privacy and security requirements for HIV/AIDS patients' sensitive data that...
Chapter
Full-text available
Big data has the potential to transform healthcare systems for the prevention and treatment of HIV/AIDS by providing analytic tools that are capable of handling huge and different types of data at very fast speeds. Big data’s transformative potential is also introverted by privacy and security requirements for HIV/AIDS patients’ sensitive data that...

Questions

Question (1)
Question
The effects of COVID-19 are having a significant impact on the many different sectors. More positively, the disruption has caused an acceleration of remote working, and a rapid focus on evaluating and de-risking the end-to-end value chain. I want to know the challenges and opportunities facing software industry amid COVID-19.

Network

Cited By