References
[1]. Alterman, A. (2003). A piece of yourself: Ethical issues in
biometric identification. Ethics and Information Technology,
5(3), 139-150. https://doi.org/10.1023/B:ETIN.0000006918
.22060.1f
[2]. Bachrach, D.G., Ogilvie, J., & Calamusa IV, J. (2016).
Price matching: To match or not to match? More Than a
Showroom, 93-108. https://doi.org/10.1057/97811375
51894_6.
[3]. Ben Elhadj-Ben Brahim, N., Lahmandi-Ayed, R., & Laussel, D. (2011). Is targeted advertising always
beneficial? International Journal of Industrial Organization,
29(6), 678-689. https://doi.org/10.1016/j.ijindorg.2011
.03.002.
[4]. Bloom, P. N. (1975). How will consumer education affect
consumer behavior? Advances in Consumer Research, 3,
208-212.
[5]. Catalyst, (2015). With Growth Comes Changes: The
2015 Canadian Smartphone Market. Retrieved from
http://catalyst.ca/2015-canadian-smartphone-market/
[6]. Chen, P., & Hsieh, H. (2012). Personalized mobile
advertising: Its key attributes, trends, and social impact.
Technological Forecasting & Social Change, 79(3), 543-
557. https://doi.org/10.1016/j.techfore.2011.08.011
[7]. Council, N. R., & Committee, W. B. (2010). Biometric
Recognition: Challenges and Opportunities. National
Academies Press.
[8]. Erdem, S. A. (2011). Maintaining the security in internet
marketing: Moving from biometrics to behaviometrics. The
Review of Business Information Systems, 15(3), 43.
[9]. Fernandez-Saavedra, B., Sanchez-Reillo, R., Ros-
Gomez, R., & Liu-Jimenez, J. (2016). Small fingerprint
scanners used in mobile devices: The impact on biometric
performance. IET Biometrics, 5(1), 28-36. https://doi.org
/10.1049/iet-bmt.2015.0018
[10]. Gilmore, W., & Erdem, A. S. (2011). The future of online
internet marketing: A solution to behavioral marketing using
biometrics. Journal of Business & Economics Research
(JBER), 6(2).
[11]. Graeff, T. R., & Harmon, S. (2002). Collecting and using
personal data: Consumers' awareness and concerns.
Journal of Consumer Marketing, 19(4), 302-318. https://d
oi.org/10.1108/07363760210433627
[12]. Heinonen, K. (2011). Consumer activity in social
media: Managerial approaches to consumers' social
media behavior. Journal of Consumer Behaviour, 10, 356-
364. https://doi.org/10.1002/cb.376
[13]. Interactive Advertising Bureau Canada. (2014). 2013
Actual+ Actual 2014 Estimated Canadian Internet
Advertising Revenue Survey Detailed Report. Retrieved from http://iabcanada.com/files/Canadian-Internet-
AdRev-Survey_2013-14.pdf
[14]. Mordini, E., & Petrini, C. (2007). Ethical and social
implications of biometric identification technology.
AnnaliDell'IstitutoSuperiore Di Sanità, 43(1), 5-11.
[15]. Olenski, S. (2016). For Consumers, Data is a Matter of
Trust. Forbes. Retrieved from: http://www.forbes.com/site
s/steveolenski/2016/04/18/for-consumers-data-is-amatter-
of-trust/#4913edf48047
[16]. Orenstein, D. (2012). Too Much Information? It
Depends. News from Brown. Retrieved from https://news
.brown.edu/articles/2012/09/tmi
[17]. Paul, G., & Irvine, J. (2016). IEDs on the road to
fingerprint authentication: Biometrics have vulnerabilities
that PINs and passwords don't. IEEE Consumer Electronics
Magazine, 5(2), 79-86. https://doi.org/10.1109/MCE.20
16.2521978
[18]. PIPEDA, (2016). The Personal Information Protection
and Electronic Documents Act (PIPEDA). Retrieved from
https://www.priv.gc.ca/en/privacy-topics/privacy-laws-incanada/
the-personal-information-protection-andelectronic-
documents-act-pipeda/
[19]. Pons, A. (2006). Biometric Marketing: Targeting the
Online Consumer. Communications of the ACM, 49(8), 60-
66. https://doi.org/10.1145/1145287.1145288
20]. Renaud, K., Hoskins, A., & von Solms, R. (2015,
August). Biometric identification: Are we ethically ready?. In
2015 Information Security for South Africa (ISSA) (pp. 1-8). IEEE. https://doi.org/10.1109/ISSA.2015.7335051
[21]. Siciliano, R. (2013). More than 30% of people don't
password protect their mobile devices. McAfee Blog
Central. Retrieved from: https://securingtomorrow.mca
fee.com/consumer/identity-protection/unprotectedmobile-
devices/
[22]. Sterling, G. (2015). Survey: 99 Percent of Consumers
Will Share Personal Info for Rewards, But Want Brands to Ask
Permission. Marketing Land. Retrieved from: http://marketi
ngland.com/survey-99-percent-of-consumers-will-sharepersonal-
info-for-rewards-also-want-brands-to-askpermission-
130786
[23]. Tang, H., Liao, S. S., & Sun, S. X. (2013). A Prediction
Framework Based on Contextual Data to Support Mobile
Personalized Marketing. Decision Support Systems, 56, 234-
246. https://doi.org/10.1016/j.dss.2013.06.004.
[24]. Tzaphlidou, M., & Pavlidou, F.-N. (2011). Biometrics
applications: Technology, ethics, and health hazards:
Special issue. The Scientific World Journal, 11, 529-532.
https://doi.org/10.1100/tsw.2011.53
[25]. Ulman, Y. I., Cakar, T., & Yildiz, G. (2015). Ethical issues
in neuromarketing: “I consume, therefore I am!”. Science
and Engineering Ethics, 21(5), 1271-1284. https://doi.org
/10.1007/s11948-014-9581-5
[26]. Yury, C. (2015). You're Doing What With My Data?
LinkedIn. Retrieved from: https://www.linkedin.com/pulse
/youre-doing-what-my-data-carrie-yur y?articleId=8
599399288329552059