but initially their occurrences and severity
were limited. Nonetheless, recent reports show that
the risk of malicious application execution on smartphones is severe and contingent (McAfee, 2010;
CISCO, 2011). Moreover, the use of smartphones
extends the infrastructure perimeter of an organization, thus amplifying the impact and the risk of potential execution of malicious applications (Sindhu
et al., 2010).