2[1]Sutton,L.A.(2001).The principles of vicarious interaction in computer-mediated-communications.Journal of Interactive Educational Communications,7(3):223-242.[DB/online]http://www.aace.org/newdl/index.cfm/files/paper_9534.pdf?fuseaction =Reader.DownloadFullText&paper_id=9534
3[2]Schultz,N.& Beach,B.(Nov,2004) From Lurkers to Posters.[DB/online]http://pre2005.flexiblelearning.net.au/resources/lurkerstoposters.pdf
4[4]Sutton,L.A.(2000).Vicarious Interaction:A Learning Theory for Computer-Mediated Communications.Tempe,AZ:Arizona State University.(ERIC Document Reproduction Service No.ED 441817).[DB/online] http://www.eric.ed.gov/ERICDocs/data/ericdocs2/content_storage_01/0000000b/80/10/eb/2d.pdf
5[5]Taylor,J.C.(2002).The Workers,the Lurkers and the Shirkers.CRIDALA 2002 Electronic Conference:Teaching and learning online.[DB/online] http://www.ouhk.edu.hk/CRIDAL/cridala2002/speeches/taylor.pdf
6[6]Su,B.,Bonk,C.J.,Magjuka,R.J.,Liu,X.& Lee S.(2005).The Importance of Interaction in Web-Based Education:A Programlevel Case Study of Online MBA Courses.Journal of Interactive Online Learning,Volume 4,Number 1,Summer,2005.ISSN:1541-4914[DB/online]http://www.ncolr.org/jiol/issues/PDF/4.1.1.pdf