/security/annual_security_report.html, checked on
May 2016.
Damopoulos, D., Kambourakis, G., Anagnostopoulos, M.,
Gritzalis, S. and Park, J. H. (2013). User privacy and
modern mobile services. Are they on the same path?.
Personal and Ubiquitous Computing, 17(7):1437–1448.
Daojing He, Chan, S. and Guizani, M. (2015). Mobile
application security: malware threats and defenses.
Wireless Communications, IEEE, 22(1):138–144.
Gartner (2014). Gartner Says 75 Percent of Mobile Security
Breaches Will Be the Result of Mobile Application
Misconfiguration. Available at: http://www.
gartner.com/newsroom/id/2753017, checked on May
2016.
Gartner (2015). Gartner Forecasts 59 Percent Mobile Data
Growth Worldwide in 2015. Available at:
http://www.gartner.com/newsroom/id/3098617,
checked on May 2016.
Gartner (2016). Gartner Says Worldwide Smartphone Sales
Grew 9.7 Percent in Fourth Quarter of 2015. Available
at: http://www.gartner.com/newsroom/id/
3215217, checked on May 2016.
Godber, A. and Dasgupta, P. (2002). Secure wireless
gateway. In The ACM workshop. Atlanta, GA, USA,
pages 41-46.
Gramatica, M. de, Labunets, K., Massacci, F., Paci, F. and
Tedeschi, A. (2015). The Role of Catalogues of Threats
and Security Controls in Security Risk Assessment: An
Empirical Study with ATM Professionals. In
Requirements Engineering: Foundation for Software
Quality, vol. 9013, Lecture Notes in Computer Science,
Cham: Springer International Publishing, pages 98–114.
Gröger, C., Silcher, S., Westkämper, E. and Mitschang, B.
(2013). Leveraging Apps in Manufacturing. A
Framework for App Technology in the Enterprise.
Procedia CIRP, 7:664–669.
Hoos, E., Gröger, C., Kramer, S. and Mitschang, B. (2015).
ValueApping: An Analysis Method to Identify Value-
Adding Mobile Enterprise Apps in Business Processes.
In Enterprise Information Systems, Lecture Notes in
Business Information Processing, vol. 227, Cham:
Springer International Publishing, pages 222–243.
Howard, M. and Lipner, S. (2006). The security
development lifecycle: SDL, a process for developing
demonstrably more secure software, Secure software
development series, Microsoft Press, Redmond.
IDC (2014). IDC Reveals Worldwide Mobile Enterprise
Applications and Solutions Predictions for 2015.
Available at: http://www.idc.com/getdoc.jsp?contain
erId=prUS25350514, checked on May 2016.
ISO/IEC (2013). ISO/IEC 27002, Information technology-
Security techniques-Code of practice for information
security controls.
Jain, S. (2014). Security Threats in Manets. A Review.
International Journal on Information Theory, 3(2):37–
50.
Jeon, W., Kim, J., Lee, Y. and Won, D. (2011). A Practical
Analysis of Smartphone Security. In Human Interface
and the Management of Information. Interacting with
Information, Lecture Notes in Computer Science, vol.
6771, Springer Berlin Heidelberg, Berlin, Heidelberg,
pages 311–320.
Jermyn, J., Salles-Loustau, G. and Zonouz, S. (2014). An
Analysis of DoS Attack Strategies Against the LTE
RAN. Journal of Cyber Security and Mobility,
3(2):159–180.
Kaspersky (2013). One in Every Six users suffer loss or
theft of mobile devices. Available at: http://www.
kaspersky.com/about/news/press/2013/one-in-every-
six-users-suffer-loss-or-theft-of-mobile-devices,
checked on May 2016.
Kennedy, M. and Sulaiman, R. (2015). Following the Wi-
Fi breadcrumbs: Network based mobile application
privacy threats. In International Conference on
Electrical Engineering and Informatics (ICEEI),
Denpasar, Bali, Indonesia, pages 265-270.
Kizza, J. M. (2015). Mobile Systems and Corresponding
Intractable Security Issues. In Guide to Computer
Network Security, Computer Communications and
Networks, Springer London, London, pages 491–507.
Lacerda, A., Queiroz, R. de and Barbosa, M. (2015). A
systematic mapping on security threats in mobile
devices. In Internet Technologies and Applications
(ITA), Wrexham, United Kingdom, pages 286-291.
Levinson, M. (2012). 6 Ways to Defend Against Drive-by
Downloads. Available at: http://www.cio.com/
article/2448967/security0/6-ways-to-defend-against-
drive-by-downloads.html, checked on May 2016.
Lookout (2011). Lookout Mobile Threat Report. Available
at: https://www.lookout.com/img/images/lookout-
mobile-threat-report-2011.pdf, checked on May 2016.
Lookout (2015). Enterprise Mobile Threat Report. The
State of iOS and Android Security Threats to Enterprise
Mobility [Whitepaper]. Available at:
https://info.lookout.com/rs/051-ESQ-475/images/
Enterprise_MTR.pdf, checked on May 2016.
Luenendonk (2014). Mobile Enterprise Review. Mehr
Strategie wagen. Available at: luenendonk-
shop.de/out/pictures/0/mc_mobileenterprisereview_stu
die_f210214(1)_fl.pdf, checked on May 2016.
Maan, J. (2012). Enterprise Mobility – A Future
Transformation Strategy for Organizations. In
Advances in Computer Science, Engineering &
Applications, Advances in Intelligent Systems and
Computing, vol. 167, Springer Berlin Heidelberg,
Berlin, Heidelberg, pages 559–567.
Marble, J. L., Lawless, W. F., Mittu, R., Coyne, J.,
Abramson, M. and Sibley, C. (2015). The Human
Factor in Cybersecurity: Robust & Intelligent Defense.
In Cyber Warfare, Advances in Information Security,
vol. 56, Springer International Publishing, Cham, pages
173–206.
Markelj, B. and Bernik, I. (2015). Safe use of mobile
devices arises from knowing the threats. Journal of
Information Security and Applications, 20:84–89.
Martin, T., Hsiao, M., Ha, D. and Krishnaswami, J. (2004).
Denial-of-Service Attacks on Battery-powered Mobile
Computers. In Proceedings of the Second IEEE
International Conference on Pervasive Computing and