Typically, these applications work under the premise that you have some sort of security measures ? such as a lockscreen pattern or PIN ? preventing any unauthorized users from successfully unlocking the device. Or, that the device has been lost (rather than stolen) and you simply wish to locate it.
Also, it may take time for a thief to notice such an application on the device and uninstall it.