Yinglei Wang

Learn More
Theory suggests that coworkers may influence individuals' technology use behaviors, but there is limited research in the technology diffusion literature that explicates how such social influence processes operate after initial adoption. We investigate how two key social influence mechanisms (identification and internalization) may explain the growth over(More)
— We demonstrate that unmodified commercial Flash memory can provide two important security functions: true random number generation and digital fingerprinting. Taking advantage of random telegraph noise (a type of quantum noise source in highly scaled Flash memory cells) enables high quality true random number generation at a rate up to 10Kbits / second. A(More)
Perceived as the form of organizing of the future, virtual teams have proliferated all over the world. However, the meaning of virtualization is more than just a work arrangement. People actually enjoy the benefits of remote communication via ICT in daily life. Given the communication difficulties in virtual teams, this paper reviews the literature of(More)
—This paper introduces a novel information hiding technique for Flash memory. The method hides data within an analog characteristic of Flash, the program time of individual bits. Because the technique uses analog behaviors, normal Flash memory operations are not affected and hidden information is invisible in the data stored in the memory. Even if an(More)
Published data on the association between CYP17 rs743572 polymorphism and risk of PC showed inconclusive results. The aim of this study was to further estimate the pooled effect size of rs743572 polymorphism and PC progression via large-scale meta-analysis. We searched the case–control studies of rs743572 polymorphism and PC risk in PubMed, Embase, and Web(More)