/security/annual_security_report.html, checked on 
May 2016. 
Damopoulos, D., Kambourakis, G., Anagnostopoulos, M., 
Gritzalis, S. and Park, J. H. (2013). User privacy and 
modern mobile services. Are they on the same path?. 
Personal and Ubiquitous Computing, 17(7):1437–1448. 
Daojing He, Chan, S. and Guizani, M. (2015). Mobile 
application security: malware threats and defenses. 
Wireless Communications, IEEE, 22(1):138–144. 
Gartner (2014). Gartner Says 75 Percent of Mobile Security 
Breaches Will Be the Result of Mobile Application 
Misconfiguration. Available at: http://www. 
gartner.com/newsroom/id/2753017, checked on May 
2016. 
Gartner (2015). Gartner Forecasts 59 Percent Mobile Data 
Growth Worldwide in 2015. Available at: 
http://www.gartner.com/newsroom/id/3098617, 
checked on May 2016. 
Gartner (2016). Gartner Says Worldwide Smartphone Sales 
Grew 9.7 Percent in Fourth Quarter of 2015. Available 
at:  http://www.gartner.com/newsroom/id/ 
3215217, checked on May 2016. 
Godber, A. and Dasgupta, P. (2002). Secure wireless 
gateway. In The ACM workshop. Atlanta, GA, USA, 
pages 41-46. 
Gramatica, M. de, Labunets, K., Massacci, F., Paci, F. and 
Tedeschi, A. (2015). The Role of Catalogues of Threats 
and Security Controls in Security Risk Assessment: An 
Empirical Study with ATM Professionals. In 
Requirements Engineering: Foundation for Software 
Quality, vol. 9013, Lecture Notes in Computer Science, 
Cham: Springer International Publishing, pages 98–114. 
Gröger, C., Silcher, S., Westkämper, E. and Mitschang, B. 
(2013). Leveraging Apps in Manufacturing. A 
Framework for App Technology in the Enterprise. 
Procedia CIRP, 7:664–669. 
Hoos, E., Gröger, C., Kramer, S. and Mitschang, B. (2015). 
ValueApping: An Analysis Method to Identify Value-
Adding Mobile Enterprise Apps in Business Processes. 
In  Enterprise Information Systems, Lecture Notes in 
Business Information Processing, vol. 227, Cham: 
Springer International Publishing, pages 222–243. 
Howard, M. and Lipner, S. (2006). The security 
development lifecycle: SDL, a process for developing 
demonstrably more secure software, Secure software 
development series, Microsoft Press, Redmond. 
IDC (2014). IDC Reveals Worldwide Mobile Enterprise 
Applications and Solutions Predictions for 2015. 
Available at: http://www.idc.com/getdoc.jsp?contain 
erId=prUS25350514, checked on May 2016. 
ISO/IEC (2013). ISO/IEC 27002, Information technology-
Security techniques-Code of practice for information 
security controls. 
Jain, S. (2014). Security Threats in Manets. A Review. 
International Journal on Information Theory, 3(2):37–
50. 
Jeon, W., Kim, J., Lee, Y. and Won, D. (2011). A Practical 
Analysis of Smartphone Security. In Human Interface 
and the Management of Information. Interacting with 
Information, Lecture Notes in Computer Science, vol. 
6771, Springer Berlin Heidelberg, Berlin, Heidelberg, 
pages 311–320. 
Jermyn, J., Salles-Loustau, G. and Zonouz, S. (2014). An 
Analysis of DoS Attack Strategies Against the LTE 
RAN.  Journal of Cyber Security and Mobility, 
3(2):159–180. 
Kaspersky (2013). One in Every Six users suffer loss or 
theft of mobile devices. Available at: http://www. 
kaspersky.com/about/news/press/2013/one-in-every-
six-users-suffer-loss-or-theft-of-mobile-devices, 
checked on May 2016. 
Kennedy, M. and Sulaiman, R. (2015). Following the Wi-
Fi breadcrumbs: Network based mobile application 
privacy threats. In International Conference on 
Electrical Engineering and Informatics (ICEEI), 
Denpasar, Bali, Indonesia, pages 265-270. 
Kizza, J. M. (2015). Mobile Systems and Corresponding 
Intractable Security Issues. In Guide to Computer 
Network Security, Computer Communications and 
Networks, Springer London, London, pages 491–507. 
Lacerda, A., Queiroz, R. de and Barbosa, M. (2015). A 
systematic mapping on security threats in mobile 
devices. In Internet Technologies and Applications 
(ITA), Wrexham, United Kingdom, pages 286-291. 
Levinson, M. (2012). 6 Ways to Defend Against Drive-by 
Downloads. Available at: http://www.cio.com/ 
article/2448967/security0/6-ways-to-defend-against-
drive-by-downloads.html, checked on May 2016. 
Lookout (2011). Lookout Mobile Threat Report. Available 
at:  https://www.lookout.com/img/images/lookout-
mobile-threat-report-2011.pdf, checked on May 2016. 
Lookout (2015). Enterprise Mobile Threat Report. The 
State of iOS and Android Security Threats to Enterprise 
Mobility [Whitepaper]. Available at: 
https://info.lookout.com/rs/051-ESQ-475/images/ 
Enterprise_MTR.pdf, checked on May 2016. 
Luenendonk (2014). Mobile Enterprise Review. Mehr 
Strategie wagen. Available at: luenendonk-
shop.de/out/pictures/0/mc_mobileenterprisereview_stu
die_f210214(1)_fl.pdf, checked on May 2016. 
Maan, J. (2012). Enterprise Mobility – A Future 
Transformation Strategy for Organizations. In 
Advances in Computer Science, Engineering & 
Applications, Advances in Intelligent Systems and 
Computing, vol. 167, Springer Berlin Heidelberg, 
Berlin, Heidelberg, pages 559–567. 
Marble, J. L., Lawless, W. F., Mittu, R., Coyne, J., 
Abramson, M. and Sibley, C. (2015). The Human 
Factor in Cybersecurity: Robust & Intelligent Defense.  
In  Cyber Warfare, Advances in Information Security, 
vol. 56, Springer International Publishing, Cham, pages 
173–206. 
Markelj, B. and Bernik, I. (2015). Safe use of mobile 
devices arises from knowing the threats. Journal of 
Information Security and Applications, 20:84–89. 
Martin, T., Hsiao, M., Ha, D. and Krishnaswami, J. (2004). 
Denial-of-Service Attacks on Battery-powered Mobile 
Computers. In Proceedings of the Second IEEE 
International Conference on Pervasive Computing and