Next Article in Journal
Unveiling State-of-Charge Effects on Elastic Properties of LiCoO2 via Deep Learning and Empirical Models
Previous Article in Journal
Harnessing Carrot Discard as a Novel Feedstock for 2,3-Butanediol Bioproduction: A Comparison of Fermentation Strategies and Bacillus Performance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining

by
Ibrahim Ileri
1,*,†,
Tugba Gurgen Erdogan
2,† and
Ayca Kolukisa-Tarhan
2,†
1
Computer Engineering Department, TED University, Ankara 06420, Turkey
2
Computer Engineering Department, Hacettepe University, Ankara 06800, Turkey
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2025, 15(14), 7810; https://doi.org/10.3390/app15147810
Submission received: 28 May 2025 / Revised: 5 July 2025 / Accepted: 10 July 2025 / Published: 11 July 2025

Abstract

Process mining (PM) is a growing field that looks at how to find, analyze, and improve process models using data from information systems. It automates much of the detailed work that usually requires a lot of manual effort. But there are concerns about privacy when dealing with this kind of data. This research introduces a novel, goal-oriented model evaluation methodology leveraging the privacy-preserving process mining (PPPM) cycle for diverse domains. The methodology encompasses the following: establishing goals and questions, targeted data acquisition, data refinement, log inspection, PPPM analysis, question resolution and interpretation, performance assessment, and possible improvement recommendations. The proposed methodology was applied in a case study analyzing four real-life event logs from different domains, yielding quantitative insights into the operational efficiency of the privacy-preserving approaches. To improve how well PPPM approaches work, we identified key issues and errors that affect their results and time utility performance. Our preliminary application of the proposed methodology indicates its potential to facilitate improvements by guiding the implementation of PPPM techniques across various domains.
Keywords: privacy-enhanced methodologies; process mining; process management privacy-enhanced methodologies; process mining; process management

Share and Cite

MDPI and ACS Style

Ileri, I.; Erdogan, T.G.; Kolukisa-Tarhan, A. A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining. Appl. Sci. 2025, 15, 7810. https://doi.org/10.3390/app15147810

AMA Style

Ileri I, Erdogan TG, Kolukisa-Tarhan A. A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining. Applied Sciences. 2025; 15(14):7810. https://doi.org/10.3390/app15147810

Chicago/Turabian Style

Ileri, Ibrahim, Tugba Gurgen Erdogan, and Ayca Kolukisa-Tarhan. 2025. "A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining" Applied Sciences 15, no. 14: 7810. https://doi.org/10.3390/app15147810

APA Style

Ileri, I., Erdogan, T. G., & Kolukisa-Tarhan, A. (2025). A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining. Applied Sciences, 15(14), 7810. https://doi.org/10.3390/app15147810

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop