<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="reviewer-report"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1305-7820</issn>
                                        <issn pub-type="epub">2587-165X</issn>
                                                                                            <publisher>
                    <publisher-name>Istanbul Ticaret University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.55071/ticaretfbd.1762972</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Information Modelling, Management and Ontologies</subject>
                                                            <subject>Information Systems Development Methodologies and Practice</subject>
                                                            <subject>Information Systems Organisation and Management</subject>
                                                            <subject>Data and Information Privacy</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgi Modelleme, Yönetim ve Ontolojiler</subject>
                                                            <subject>Bilgi Sistemleri Geliştirme Metodolojileri ve Uygulamaları</subject>
                                                            <subject>Bilgi Sistemleri Organizasyonu ve Yönetimi</subject>
                                                            <subject>Veri ve Bilgi Gizliliği</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>İŞLETMELER ARASI HETEROJEN VERİLERİN GİZLİLİĞİNİ KORUMAYA YÖNELİK ÖĞRENME MODEL ÇERÇEVESİ</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>A LEARNING MODEL FRAMEWORK FOR PRIVACY PRESERVATION OF HETEROGENEOUS DATA BETWEEN BUSINESSES</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-1133-5995</contrib-id>
                                                                <name>
                                    <surname>Aydıner</surname>
                                    <given-names>Arafat Salih</given-names>
                                </name>
                                                                    <aff>İSTANBUL MEDENİYET ÜNİVERSİTESİ, SİYASAL BİLGİLER FAKÜLTESİ, İŞLETME BÖLÜMÜ, YÖNETİM BİLİŞİM SİSTEMLERİ ANABİLİM DALI</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20251218">
                    <day>12</day>
                    <month>18</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>24</volume>
                                        <issue>48</issue>
                                        <fpage>725</fpage>
                                        <lpage>743</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250811">
                        <day>08</day>
                        <month>11</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20251104">
                        <day>11</day>
                        <month>04</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2002, İstanbul Commerce University Journal of Science</copyright-statement>
                    <copyright-year>2002</copyright-year>
                    <copyright-holder>İstanbul Commerce University Journal of Science</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Yapay zekâ uygulamalarının hızla yaygınlaştığı bir çağda, veri kullanımının yaygınlaşması ve kişisel hakların korunmasının giderek zorlaşması, bu alanın doğası gereği dijital kişisel veri koruma tekniklerinin geliştirilmesinin önünü açmıştır. Bu çalışmada, kavramsal analiz kullanılarak literatürden kişisel verilerin korunmasına yönelik gizlilik koruma teknikleri çıkarılmıştır. Literatür analizinden 30 farklı makaleye dayanarak, aynı amaç için farklı verilerin eğitilmesine olanak tanıyan Federe Transfer Öğrenme yöntemini tanımlayan bir model önerisi geliştirilmiştir. Böylece çalışma, yerel verileri paylaşmadan çeşitli verilerin kullanılmasını sağlayarak ve ortak sorunların çözümü için gizlilik koruması ile karar alma desteği sağlayarak sahadaki pratik veri kullanım zorluklarını ele alan teorik ve pratik katkılar sağlayacaktır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>In the era of rapid artificial intelligence implementations, the proliferation of data use and the increasing difficulty of protecting personal rights, coupled with its inherent nature, have paved the way for the development of digital personal data protection techniques. In this study, privacy preservation techniques for protecting personal data were extracted from the literature using conceptual analysis. A model proposal was developed based on 30 different articles from the literature analysis, identifying the Federated Transfer Learning method, which enables training different data for the same purpose. Thus, the study will provide theoretical and practical contributions that address practical data usage challenges in the field by enabling the use of diverse data without sharing local data and providing privacy preservation with decision-making support for solving common problems.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Veri gizliliği</kwd>
                                                    <kwd>  Gizlilik Koruma Teknikleri</kwd>
                                                    <kwd>  Federe Öğrenme</kwd>
                                                    <kwd>  Federe Transfer Öğrenme</kwd>
                                                    <kwd>  Heterojen Veriler</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Data Privacy</kwd>
                                                    <kwd>  Privacy Preservation Techniques</kwd>
                                                    <kwd>  Federated Learning</kwd>
                                                    <kwd>  Federated Transfer Learning</kwd>
                                                    <kwd>  Heterogeneous Data</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Acar, A., Aksu, H., Uluagac, A. S., &amp; Conti, M. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys, 51(4). https://doi.org/10.1145/3214303</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Acquisti, A., Brandimarte, L., &amp; Loewenstein, G. (2015). Age of information. Science, 347(6221), 509–514. https://doi.org/10.1017/9781108943321</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Al-Rubaie, M., &amp; Chang, J. M. (2019). Privacy-Preserving Machine Learning: Threats and Solutions. IEEE Security and Privacy, 17(2), 49–58. https://doi.org/10.1109/MSEC.2018.2888775</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Barker, K., Askari, M., Banerjee, M., Ghazinour, K., MacKas, B., Majedi, M., Pun, S., &amp; Williams, A. (2009). A data privacy taxonomy. Lecture Notes in Computer Science (subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5588 LNCS, 42–54. https://doi.org/10.1007/978-3-642-02843-4_7</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Baumeister, R. F., &amp; Leary, M. R. (1997). Writing narrative literature reviews. Review of General Psychology, 1(3), 311–320. https://doi.org/10.1037/1089-2680.1.3.311</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., &amp; Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. Proceedings - IEEE Symposium on Security and Privacy, 459–474. https://doi.org/10.1109/SP.2014.36</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Briggs, C., Fan, Z., &amp; Andras, P. (2020). Federated learning with hierarchical clustering of local updates to improve training on non-IID data. Proceedings of the International Joint Conference on Neural Networks. https://doi.org/10.1109/IJCNN48605.2020.9207469</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., &amp; Maxwell, G. (2018). Bulletproofs: Short Proofs for Confidential Transactions and More. Proceedings - IEEE Symposium on Security and Privacy, 2018-May, 315–334. https://doi.org/10.1109/SP.2018.00020</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Chamikara, M. A. P., Bertok, P., Khalil, I., Liu, D., &amp; Camtepe, S. (2021a). PPaaS: Privacy Preservation as a Service. Computer Communications, 173(December 2020), 192–205. https://doi.org/10.1016/j.comcom.2021.04.006</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Chamikara, M. A. P., Bertok, P., Khalil, I., Liu, D., &amp; Camtepe, S. (2021b). Privacy preserving distributed machine learning with federated learning. Computer Communications, 171(April 2020), 112–125. https://doi.org/10.1016/j.comcom.2021.02.014</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Chen, Y., Qin, X., Wang, J., Yu, C., &amp; Gao, W. (2020). FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare. IEEE Intelligent Systems, 35(4), 83–93. https://doi.org/10.1109/MIS.2020.2988604</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Dülger, M. V. (2021). Sağlık Hukukunda Kişisel Verilerin Korunması ve Hasta Mahremiyeti (Sağlık Hukukunda Kişisel Verilerin Korunması ve Hasta Mahremiyeti. Ssrn, 1(2), 43–80. https://ssrn.com/abstract=3792208%0Ahttp://dx.doi.org/10.2139/ssrn.3792208</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Dwork, C., &amp; Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3–4), 211–487. https://doi.org/10.1561/0400000042</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">European Parliament &amp; Council of the European Union. (2016). General Data Protection Regulation. Official Journal of the European Union, 2014(March 2014).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Fano, R. M. (1968). The balance of knowledge and the balance of power. Scientific American, 218(5), 149–152.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Giancaspro, M. (2017). Is a ‘smart contract’ really a smart idea? Insights from a legal perspective. Computer Law and Security Review, 33(6), 825–835. https://doi.org/10.1016/j.clsr.2017.05.007</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Guo, W., Wang, Y., Chen, X., &amp; Jiang, P. (2024). Federated transfer learning for auxiliary classifier generative adversarial networks: framework and industrial application. Journal of Intelligent Manufacturing, 35(4), 1439–1454. https://doi.org/10.1007/s10845-023-02126-z</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Guo, W., Zhuang, F., Zhang, X., Tong, Y., &amp; Dong, J. (2024). A comprehensive survey of federated transfer learning: challenges, methods and applications. Frontiers of Computer Science, 18(6). https://doi.org/10.1007/s11704-024-40065-x</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Hassan, M. U., Rehmani, M. H., &amp; Chen, J. (2020). Differential Privacy Techniques for Cyber Physical Systems: A Survey. IEEE Communications Surveys and Tutorials, 22(1), 746–789. https://doi.org/10.1109/COMST.2019.2944748</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Kardaş, S., &amp; Kiraz, M. (2018). Bitcoin’DMahremi̇yeti̇ SağlamaYöntemleri̇. Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 4(1), 1–9. https://doi.org/10.18640/ubgmd.429461</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Keshk, M., Turnbull, B., Moustafa, N., Vatsalan, D., &amp; Choo, K. K. R. (2020). A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Transactions on Industrial Informatics, 16(8), 5110–5118. https://doi.org/10.1109/TII.2019.2957140</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Khalid, N., Qayyum, A., Bilal, M., Al-Fuqaha, A., &amp; Qadir, J. (2023). Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Computers in Biology and Medicine, 158(April), 106848. https://doi.org/10.1016/j.compbiomed.2023.106848</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Li, T., Sahu, A. K., Talwalkar, A., &amp; Smith, V. (2020). Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Processing Magazine, 37(3), 50–60. https://doi.org/10.1109/MSP.2020.2975749</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Li, X., Chi, H. lin, Lu, W., Xue, F., Zeng, J., &amp; Li, C. Z. (2021). Federated transfer learning enabled smart work packaging for preserving personal image information of construction worker. Automation in Construction, 128(January), 103738. https://doi.org/10.1016/j.autcon.2021.103738</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Liu, L., Zhang, J., Song, S. H., &amp; Letaief, K. B. (2020). Client-Edge-Cloud Hierarchical Federated Learning. IEEE International Conference on Communications, 2020-June. https://doi.org/10.1109/ICC40277.2020.9148862</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Marijan, D., &amp; Lal, C. (2022). Blockchain verification and validation: Techniques, challenges, and research directions. Computer Science Review, 45, 100492. https://doi.org/10.1016/j.cosrev.2022.100492</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">McMahan, H. B., Moore, E., Ramage, D., Hampson, S., &amp; Arcas, B. A. y. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 54, 10.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Metin, B., Erkan, S., Atasu, İ., &amp; Yılmaz, E. (2019). Privacy Impact Assessment as a Tool for GDPR Compliance Preparation. Kişisel Verileri Koruma Dergisi, 1(2), 75–86.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Mulligan, D. K., Koopman, C., &amp; Doty, N. (2016). Privacy is an essentially contested concept: A multi-dimensional analytic for mapping privacy. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083). https://doi.org/10.1098/rsta.2016.0118</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Nissim, K., &amp; Wood, A. (2018). Is privacy privacy? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 376(2128).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Oktay, E. (2022). Genomik Çalişmalarda Kullanilan Makine Öğrenmesi Modellerinin Blokzincir Temelli Bir Eko Sistemde Federe Öğrenme Yöntemiyle Geliştirilmesi İçin Kavramsal Bir Çalişma. Istanbul Medeniyet Üniversitesi.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Özcandan, N., Kalkar, Ö., Bingöl, M. A., Sertaya, İ., Dursun, T., Yıldız, O., &amp; Türk, E. (2020). Blokzincirlerde Güvenlik ve Mahremiyet.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Pouriyeh, S., Shahid, O., Parizi, R. M., Sheng, Q. Z., Srivastava, G., Zhao, L., &amp; Nasajpour, M. (2022). Secure Smart Communication Efficiency in Federated Learning: Achievements and Challenges. Applied Sciences (Switzerland), 12(18). https://doi.org/10.3390/app12188980</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Putra, M. A. P., Rachmawati, S. M., Abisado, M., &amp; Sampedro, G. A. (2023). HFTL: Hierarchical Federated Transfer Learning for Secure and Efficient Fault Classification in Additive Manufacturing. IEEE Access, 11, 54795–54807. https://doi.org/10.1109/ACCESS.2023.3280471</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Ram Mohan Rao, P., Murali Krishna, S., &amp; Siva Kumar, A. P. (2018). Privacy preservation techniques in big data analytics: a survey. Journal of Big Data, 5(1). https://doi.org/10.1186/s40537-018-0141-8</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Shin, D. D. H. (2019). Blockchain: The emerging technology of digital trust. Telematics and Informatics, 45(August). https://doi.org/10.1016/j.tele.2019.101278</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Solove, D. J. (2008). Understanding Privacy. Massachusetts: Harvard University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Türkiye Büyük Millet Meclisi (T.B.M.M). (2016). Kişisel verilerin korunmasi kanunu. Resmi Gazete, 12301–12317.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Zhang, Z., Ming, Y., &amp; Wang, Y. (2024). A federated transfer learning approach for surface electromyographic hand gesture recognition with emphasis on privacy preservation. Engineering Applications of Artificial Intelligence, 136(PA), 108952. https://doi.org/10.1016/j.engappai.2024.108952</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Zheng, G., Kong, L., &amp; Brintrup, A. (2023). Federated machine learning for privacy preserving, collective supply chain risk prediction. International Journal of Production Research, 61(23), 8115–8132. https://doi.org/10.1080/00207543.2022.2164628</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Zhou, X., Ye, X., Wang, K. I. K., Liang, W., Nair, N. K. C., Shimizu, S., Yan, Z., &amp; Jin, Q. (2023). Hierarchical Federated Learning With Social Context Clustering-Based Participant Selection for Internet of Medical Things Applications. IEEE Transactions on Computational Social Systems, 10(4), 1742–1751. https://doi.org/10.1109/TCSS.2023.3259431</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
