“…The huge amount of research coupled with well documented security concerns and breaches make industries cautious in adopting and implementing BC. A good evaluation is required in deciding which BC technology to use as there are so many variants of the technology [61], [40], [42], [93]. Given that DLTs themselves do not, as a rule, integrate with each other, users may have to access several applications in order to use different services.…”