Digitalization of guest record management through a web-based information system to support security and efficiency
Main Article Content
Abstract
Digitization of visitor registration improves efficiency and security in visit management in many institutions. This project seeks to create a web-based information system that replaces manual registration techniques to reduce the possibility of data loss and inaccuracy of registration, while increasing the efficiency and accuracy of guest information processing. The study used a software development methodology that leverages the Rapid Application Development (RAD) concept, which facilitates rapid and adaptive system development. The novelty of this system lies in its integration of automated blacklist detection and personalized notification workflows, features that are not commonly found in prior visitor registration systems. The system was designed and implemented specifically within an institutional environment but has the potential to be generalized and adapted for diverse organizational contexts, including government offices, corporate facilities, and educational institutions. The study results show that the web-based information system improves efficiency in visitor registration through automated verification, real-time monitoring, and notification integration, thereby facilitating safer and more organized guest management. This solution aims to enable institutions to improve their visitor reception processes, strengthen workplace security, and facilitate digital transformation in visit management.
Downloads
Article Details
CALDER, A., & WATKINS, S. (2024). IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition. IT Governance – An International Guide to Data Security and ISO 27001/ISO 27002, Eighth Edition. https://doi.org/10.2307/j.ctv336p2z9
Corso, A., Moss, R. J., Koren, M., Lee, R., & Kochenderfer, M. J. (2021). A survey of algorithms for black-box safety validation of cyber-physical systems. Journal of Artificial Intelligence Research, 72, 377–428. https://doi.org/10.1613/JAIR.1.12716
Dezfoli, H., & Newman, J. (2022). Scraping bot detection using machine learning. In Degree Project in Technology.
Đurović, M., & Kniepkamp, T. (2022). Good advice is expensive–bad advice even more: the regulation of online reviews. Law, Innovation and Technology, 14(1), 128–156. https://doi.org/10.1080/17579961.2022.2047523
Fiesler, C., Beard, N., & Keegan, B. C. (2020). No robots, spiders, or scrapers: Legal and ethical regulation of data collection methods in social media terms of service. Proceedings of the 14th International AAAI Conference on Web and Social Media, ICWSM 2020, 14, 187–196. https://doi.org/10.1609/icwsm.v14i1.7290
Guest, O., & Martin, A. E. (2023). On Logical Inference over Brains, Behaviour, and Artificial Neural Networks. Computational Brain and Behavior, 6(2), 213–227. https://doi.org/10.1007/s42113-022-00166-x
Han, X., Wallace, B. C., & Tsvetkov, Y. (2020). Explaining black box predictions and unveiling data artifacts through influence functions. Proceedings of the Annual Meeting of the Association for Computational Linguistics, 5553–5563. https://doi.org/10.18653/v1/2020.acl-main.492
Maatuk, A. M., & Abdelnabi, E. A. (2021). Generating UML use case and activity diagrams using NLP techniques and heuristics rules. ACM International Conference Proceeding Series, 271–277. https://doi.org/10.1145/3460620.3460768
MacLeod, K. (2024). Delivering the Visitor Experience: How to Create, Manage and Develop an Unforgettable Visitor Experience at Your Museum, Rachel Mackay, Facet Publishing, 2023. 224p. Softcover, $40.98. 9781783305490. College & Research Libraries, 85(6). https://doi.org/10.5860/crl.85.6.945
Mahussin, A. H., Rahman, A. A., Kairan, O., Ghazali, J. N., Azry, M., Malik, A., Bukhari, A., & Yasin, M. (2022). MySRS-The Development of Web-Based using PHP Laravel Framework. Journal of Mathematics and Computing Science, 8(2), 143–158.
Muittari, J. (2020). Modern Web Back-End.
Planas, E., & Cabot, J. (2020). How are UML class diagrams built in practice? A usability study of two UML tools: Magicdraw and Papyrus. Computer Standards and Interfaces, 67, 103363. https://doi.org/10.1016/j.csi.2019.103363
Pricillia, T., & Zulfachmi. (2021). Perbandingan Metode Pengembangan Perangkat Lunak (Waterfall, Prototype, RAD). Jurnal Bangkit Indonesia, 10(1), 6–12. https://doi.org/10.52771/bangkitindonesia.v10i1.153
Riccio, V., Jahangirova, G., Stocco, A., Humbatova, N., Weiss, M., & Tonella, P. (2020). Testing machine learning based systems: a systematic mapping. Empirical Software Engineering, 25(6), 5193–5254. https://doi.org/10.1007/s10664-020-09881-0
Shaker, A. A., Austin, S. F., Jørgensen, M. S., Sørensen, J. A., Bechmann, H., Kinnerup, H. E., Petersen, C. J., Olsen, R. K., & Simonsen, E. (2023). Facilitating In-House Mobile App Development Within Psychiatric Outpatient Services for Patients Diagnosed With Borderline Personality Disorder: Rapid Application Development Approach. JMIR Human Factors, 10, e46928. https://doi.org/10.2196/46928
Suwitra Wirya, I. M. (2023). Analysis of the Implementation of Standard Operating Procedures (SOP) in the Housekeeping and Front Office Department of Frii Bali Echo Beach Hotel Canggu. Jurnal Manajemen Pelayanan Hotel, 7(1), 192. https://doi.org/10.37484/jmph.070110
Tran, Q. (2021). Finalize admin UI & backend for a web application with PHP as event managing and scheduling system : case company : company X. Theseus. http://www.theseus.fi/handle/10024/500981
Whang, S. E., Roh, Y., Song, H., & Lee, J. G. (2023). Data collection and quality challenges in deep learning: a data-centric AI perspective. VLDB Journal, 32(4), 791–813. https://doi.org/10.1007/s00778-022-00775-9
Willett, K., & Thor Arnason, S. (2007). Implementing an Information Security Management System—Plan-Do-Check-Act. How to Achieve 27001 Certification, 97–162. https://doi.org/10.1201/9781420013139.ch4

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.