Professional Documents
Culture Documents
LITERATURE REVIEW
2.0 INTRODUCTION
Organizations need to take care of security measures concerning visitor’s management and
tracking. Corporate offices will get too many number of visitors every day for many reasons such
The disadvantages of this system, is centered on the area of illiteracy and availability of materials
needed for, by the visitors to register with the security. This problem can be encountered mainly
Organizations need to take care of security measures concerning visitors’ management and
tracking. Corporate offices will get too many number of visitors every day for many reasons such
visitor approvals , process management , pass or badge and record keeping (Aardvark, 2008).
2.1.2 History
Since September 11, 2001, many companies and government agencies enhanced building
security by including access control and documenting visitors. The most defining event
illustrating the need to enhance school security worldwide occurred in Beslan, Russia on
September 1, 2004. A group of mostly Chechen terrorists took over a school and held more than
1,100 hostages for three days until Russian security forces stormed the building. A severe
firefight ensued and ultimately over 350 people died, including 184 children. Shortly afterwards,
Deputy Secretary of Education Eugene W. Hickok issued a policy letter to all U.S. schools
listing “a closed campus approach to limit visitors” as one effective measure of enhancing school
security. Since then, several new computerized visitor management systems have been
In addition to physical barriers limiting school access to one point, schools have discovered the
need to improve their process for recording who is entering and exiting the facility. The basic
clipboard method is limiting because it is slow and provides little information other than name
and time. Several computer based systems are available that provide a wealth of information to
enhance both security and front office efficiency. Many systems have a kiosk type environment
where a visitor essentially checks himself in much like the clipboard method, but the system has
the ability to record much more information quickly. This additional information can include a
photo of the visitor, the reason he is there, to what location he is going, a time stamp, and more
(Hagan, 2012).
Technical research involves study on similar system to know the functionality features of the
existing system, this is to find the flaws in the existing systems and to take note and suggest good
features.
2.2 REVIEW OF RELATED LITERATURE
Visitor Management Software is a working system that allows the visitor to call the inmates from
the gate requires someone to answer from inside the house. Visitor Management Software is the
outcome of motivation that has come out of the drawbacks or loopholes of the present system of
working. Visitor management system (VMS) is developed using the trends in information
technology which provides a feature to capture visitor information by using identification proof
of the visitor and save them to a database that is centralized (Spectra, 2015) shown in Figure 1.
LobbyGuard Kiosk System has helped the school organization in saving its time at the same time
the student’s safety is not at risk. The above Fig.2 shown the lobby guard system for school
visitors. Functionality provided by the system has helped the organizations in saving the time of
its employees otherwise they had to attend to the visitor at the entrance whenever a new visitor
arrives. The organization is exited with the features offered by the system since it saved
employees time and takes care of the student’s safety (LobbyGuard, 2013).
Installation of the system creates an impression to the visitor that safety is the top priority for the
organization. The system takes care of the sign-in process which is streamlined by powerful
solutions offered by the system. The system tracks every visitor who enters the school premises.
Sign-in and sign-out process is tracked by the system with other details such as whom has the
visitor come to meet with reason for the visit (LobbyGuard, 2013).
Happy Visitor Management system manages all the activities that are involved in managing a
visitor as shown in Fig.3 below, the system was developed using cloud computing. The main
idea of the system is to make the visitor an easy activity making it a trouble free visit (Happy
Visitor, 2014).
Figure 3: Happy Visitor System
The Visitor Registration System is a web-based application used by the Board to register, screen
and manage visitors to buildings and other locations owned or leased by the Board (O’Malley
Visitor Management System refers to the gathering of information from visitors and then
tracking their whereabouts within the school. The purpose is to document the information and
limit visitor access to only persons who have a need to be there. There are different methods for
documenting this information including manual logs and computerized systems. For many
schools, this process is manual and consists of a clipboard and hand written visitor stickers.
While this is better than nothing, there are technologies today that offer much more in an effort
Visitor Management is the recording and collection of visitor data, either manually or through
automated check in software, for the purpose of knowing who is in the facility, who they are
Anna Spenceley, Jon Kohl, Simon Mcarthur, And Peter MYL says that, there are many different
types of visitors to protected areas. They may be official guests to a national park; researchers
working in a strict nature reserve; volunteers assisting with a national park work program;
educational groups learning about special natural or cultural heritage; or people who conduct
their business within a protected area including contractors and shop owners. Importantly,
visitors also include tourists and recreationists. In this chapter, we briefly examine the types of
visitors protected area managers may need to deal with and management considerations
associated with such visitor use. We, however, provide a focus on tourism and its management in
this chapter. Depending on the International Union for Conservation of Nature (IUCN) protected
area category, tourism and recreation are common visitor uses of most protected areas and
important contributors to local and national economies. As part of managing protected areas for
within reserves, the provision of visitor services and facilities and management responses to
Andrews International (AI) (2014) developed Visitor Management System to provide security
managers with an efficient tool to reduce delays in logging and badging visitors, distinguish
special consideration visitors, and identify individuals “not to be admitted”. The system enables
notes and name tag creation – all through one easy-to-use program.
The new visitor management system also offers a higher level of assurance that visitors will not
re-enter the premises at a future date without checking in again, as badges are programmed to
automatically expire after a certain number of hours. Other important elements of the new
system can be found in the parking garage, which is connected via a Wi-Fi wireless link to the
AMAG system. Like the guard at the check-in desk, a security guard in the garage also can scan
visitors’ credentials and print out a bar code badge. The guard does this using a wireless
handheld device that has a built-in scanner. As Whelan explains, “It’s set up like a gun.” The
guard scans a bar code on the back of the visitor’s driver’s license by pulling a trigger.
Alternatively, the guard can type in the visitor’s information. A badge is printed out via a
wireless link sends the visitor’s data to the AMAG system about 100 to 200 feet away, where the
record is added to the visitor database. The most challenging part of the installation was
integrating three separate systems based on Internet protocol communications, including the
visitor management system and two different access control systems, comments Whelan. “The
Easy Lobby system had to populate the access control system once it enters a visitor and we had
to manage that data so it’s deleted after x amount of time,” he explains (Whelan, 2009).
iVisitor by Veristream provides a secure visitor management system for multi-tenant facilities of
any size looking for easier visitor control, increased visitor security and simplified visitor
badging. No more maintaining written visitor logs, struggling with software or on-site servers.
iVisitor is the simplest, hassle-free way to control visitors and property in a multi-tenant setting
In typical electronic visitor management situations, the software is installed on site. For a multi-
tenant facility, this can cause major headaches when the server goes down or the software
crashes. No local IT? You are left trying to solve the problem yourself. iVisitor is different
because it is online and managed by Veristream. A simple Internet connection brings you
Veristream’s secure, encrypted and feature-rich visitor management system. Your visitor
• There are an unlimited number of user authorities, including tenant, management and security
users.
electronic visitor' record management systems use a computer network to monitor and record
visitor information. Furthermore, it can capture all relevant visitor's information, including
photo, signature, fingerprint, and name of the visitor, reason for the visit as well as entry and exit
times. An electronic visitors' record management system improves upon most of the negative
points of a pen and paper system (Kat Technologies, 2017). Visitor's ID can be checked against
national and local databases against fugitives, as well as in-house databases for potential security
alerts. A computerized visitors' record management system can be customized to print visitors ID
cards for one-time only or continuing use. Moreover, several desktop-based visitor management
software applications are currently available. These applications typically consist of three
fundamental components: (a) visitor registration, (b) visitor badge printing, and (c) reporting
functionality. Some of the applications are capable of automatically capturing visitor information
directly from a visitor's driver license, passport, or other government issued identification
According to Virtual Galaxy (2010), visitor management is more than just optimizing the flow of
visitors in your buildings. It provides you with a way to implement your company's security
policy and to obtain reliable information on your visitors and visits. With a good visitors'
management system module, one can manage a company's flow of visitors in a simple and
effective way. Optimizing visitor management process can significantly reduce costs, improve
safety and security, and generate valuable visitor data. Each day scores of visitors pass through
the entrances to your facility. Having the ability to screen and track them can contribute
substantially to the safety and protection of your personnel and property. With a computer-based
visitors' record management system, one can improve security desk productivity by scanning
business cards or driver's licenses to quickly register visitors, and provide voice coaching to
guide visitors during the registration process (Virtual Galaxy, 2010; Wikipedia, 2017).
Nedap (2008) submitted that visitors' management systems can also have the functionality that
ensure visitors are only granted access if their visit is approved by an authorized person present
in the building. This gives you much tighter control over the visit. The system gives the
possibility to set a maximum presence time for each visit. If the visitor does not handover in his
badge on time, it will be automatically blocked. One can also set a limit on the number of badge
movements that can be made in and out of a zone. If the maximum number of movements has
been exceeded, an alarm is generated. A computer-based visitor record management system has
distinct advantages when it comes to registering and monitoring visitors. According to Virtual
Galaxy (2010), the ability to automatically screen and track visitors is an essential part of a
complete security plan. A computer-based visitors' record management system should have the
following functionalities:
Check-out visitors
Screen visitors
The researcher, cannot but have the same idea with the scholars, that our computerized visitor’s
management system needs total restructuring before effective and accurate means of recording
information could be conducted, by using specialized method as check to ensure that data
In most developing countries revenue collection and occupant willing to pay the levy imposed on
the government property he/she is using, is what prompted this idea of business premises
payment system. Occupants (landlords) must ensure that their tenants register all types of
businesses established within the street or area as the case may be.