Main Article Content

Helvina Salsabila Mawadah
M Azhar Prabukusumo
Bagus Hendra Saputra

Abstract

Digitization of visitor registration improves efficiency and security in visit management in many institutions. This project seeks to create a web-based information system that replaces manual registration techniques to reduce the possibility of data loss and inaccuracy of registration, while increasing the efficiency and accuracy of guest information processing. The study used a software development methodology that leverages the Rapid Application Development (RAD) concept, which facilitates rapid and adaptive system development. The novelty of this system lies in its integration of automated blacklist detection and personalized notification workflows, features that are not commonly found in prior visitor registration systems. The system was designed and implemented specifically within an institutional environment but has the potential to be generalized and adapted for diverse organizational contexts, including government offices, corporate facilities, and educational institutions. The study results show that the web-based information system improves efficiency in visitor registration through automated verification, real-time monitoring, and notification integration, thereby facilitating safer and more organized guest management. This solution aims to enable institutions to improve their visitor reception processes, strengthen workplace security, and facilitate digital transformation in visit management.

Downloads

Download data is not yet available.

Article Details

How to Cite
Mawadah, H. S. ., Prabukusumo, M. A. ., & Saputra, B. H. . (2025). Digitalization of guest record management through a web-based information system to support security and efficiency. Journal of Intelligent Decision Support System (IDSS), 8(2), 106-114. https://doi.org/10.35335/idss.v8i2.297
References
Aila Gema Safitri, & Firas Atqiya. (2022). Automatic model transformation on multi-platform system development with model driven architecture approach. Computer Science and Information Technologies, 3(3), 157–168. https://doi.org/10.11591/csit.v3i3.pp157-168
CALDER, A., & WATKINS, S. (2024). IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition. IT Governance – An International Guide to Data Security and ISO 27001/ISO 27002, Eighth Edition. https://doi.org/10.2307/j.ctv336p2z9
Corso, A., Moss, R. J., Koren, M., Lee, R., & Kochenderfer, M. J. (2021). A survey of algorithms for black-box safety validation of cyber-physical systems. Journal of Artificial Intelligence Research, 72, 377–428. https://doi.org/10.1613/JAIR.1.12716
Dezfoli, H., & Newman, J. (2022). Scraping bot detection using machine learning. In Degree Project in Technology.
Đurović, M., & Kniepkamp, T. (2022). Good advice is expensive–bad advice even more: the regulation of online reviews. Law, Innovation and Technology, 14(1), 128–156. https://doi.org/10.1080/17579961.2022.2047523
Fiesler, C., Beard, N., & Keegan, B. C. (2020). No robots, spiders, or scrapers: Legal and ethical regulation of data collection methods in social media terms of service. Proceedings of the 14th International AAAI Conference on Web and Social Media, ICWSM 2020, 14, 187–196. https://doi.org/10.1609/icwsm.v14i1.7290
Guest, O., & Martin, A. E. (2023). On Logical Inference over Brains, Behaviour, and Artificial Neural Networks. Computational Brain and Behavior, 6(2), 213–227. https://doi.org/10.1007/s42113-022-00166-x
Han, X., Wallace, B. C., & Tsvetkov, Y. (2020). Explaining black box predictions and unveiling data artifacts through influence functions. Proceedings of the Annual Meeting of the Association for Computational Linguistics, 5553–5563. https://doi.org/10.18653/v1/2020.acl-main.492
Maatuk, A. M., & Abdelnabi, E. A. (2021). Generating UML use case and activity diagrams using NLP techniques and heuristics rules. ACM International Conference Proceeding Series, 271–277. https://doi.org/10.1145/3460620.3460768
MacLeod, K. (2024). Delivering the Visitor Experience: How to Create, Manage and Develop an Unforgettable Visitor Experience at Your Museum, Rachel Mackay, Facet Publishing, 2023. 224p. Softcover, $40.98. 9781783305490. College & Research Libraries, 85(6). https://doi.org/10.5860/crl.85.6.945
Mahussin, A. H., Rahman, A. A., Kairan, O., Ghazali, J. N., Azry, M., Malik, A., Bukhari, A., & Yasin, M. (2022). MySRS-The Development of Web-Based using PHP Laravel Framework. Journal of Mathematics and Computing Science, 8(2), 143–158.
Muittari, J. (2020). Modern Web Back-End.
Planas, E., & Cabot, J. (2020). How are UML class diagrams built in practice? A usability study of two UML tools: Magicdraw and Papyrus. Computer Standards and Interfaces, 67, 103363. https://doi.org/10.1016/j.csi.2019.103363
Pricillia, T., & Zulfachmi. (2021). Perbandingan Metode Pengembangan Perangkat Lunak (Waterfall, Prototype, RAD). Jurnal Bangkit Indonesia, 10(1), 6–12. https://doi.org/10.52771/bangkitindonesia.v10i1.153
Riccio, V., Jahangirova, G., Stocco, A., Humbatova, N., Weiss, M., & Tonella, P. (2020). Testing machine learning based systems: a systematic mapping. Empirical Software Engineering, 25(6), 5193–5254. https://doi.org/10.1007/s10664-020-09881-0
Shaker, A. A., Austin, S. F., Jørgensen, M. S., Sørensen, J. A., Bechmann, H., Kinnerup, H. E., Petersen, C. J., Olsen, R. K., & Simonsen, E. (2023). Facilitating In-House Mobile App Development Within Psychiatric Outpatient Services for Patients Diagnosed With Borderline Personality Disorder: Rapid Application Development Approach. JMIR Human Factors, 10, e46928. https://doi.org/10.2196/46928
Suwitra Wirya, I. M. (2023). Analysis of the Implementation of Standard Operating Procedures (SOP) in the Housekeeping and Front Office Department of Frii Bali Echo Beach Hotel Canggu. Jurnal Manajemen Pelayanan Hotel, 7(1), 192. https://doi.org/10.37484/jmph.070110
Tran, Q. (2021). Finalize admin UI & backend for a web application with PHP as event managing and scheduling system : case company : company X. Theseus. http://www.theseus.fi/handle/10024/500981
Whang, S. E., Roh, Y., Song, H., & Lee, J. G. (2023). Data collection and quality challenges in deep learning: a data-centric AI perspective. VLDB Journal, 32(4), 791–813. https://doi.org/10.1007/s00778-022-00775-9
Willett, K., & Thor Arnason, S. (2007). Implementing an Information Security Management System—Plan-Do-Check-Act. How to Achieve 27001 Certification, 97–162. https://doi.org/10.1201/9781420013139.ch4