“…Table 3 shows that most of the Encryption issues do not clearly define the algorithms they use, although there are some articles that use Multi-dimensional Data aggregation and even Cognitive Risk Control. Multi-dimensional Data aggregation [42,[55][56][57]60,62,64] Cognitive Risk Control [37,82] Not Defined [19,20,[22][23][24]26,28,29,31,35,36,38,39,43,[45][46][47][48]50,[52][53][54]58,61,63,73,[76][77][78][79]81,[98][99][100][101][102][103][104][105]…”