The  Book  of  Job1   God’s  Policies  and  “the  Retribution  Principle”    

 “The  book  of  Job  is  all  about  God’s  policies  and  what  role  the  retribution  principle  has  in  those  policies.     (Despite  what  Job’s  friends  think)  it  is  not  the  retribution  principle  that  is  on  trial,  nor  is  it  Job  who  is  on   trial    .  .  .  it  is  God’s  policies,  and  particularly  his  use  of  and  commitment  to  the  retribution  principle,  that   are  on  trial.     First  Satan  and  then  Job  put  these  two  things  (God’s  policies  and  the  Retribution  Principle)  on  trial:      1.  Satan  claims  that  God’s  policies  should  be  called  into  question  because  rewarding  the  righteous  inhibits   the  development  of  true,  disinterested  righteousness  (“Does  Job  fear  God  for  nothing?”  [Job  1:9]).  Thus  the   retribution  principle  is  called  into  question  by  suggesting  that  it  is  counterproductive.       2.  Job  claims  that  God’s  policies  should  be  called  into  question  because  they  inexplicably  allow  for  righteous   people  to  suffer,  contrary  to  his  stated  preference  (i.e.,  the  retribution  principle).”     The  friends  defend  the  retribution  principle  and  deny  Job’s  righteousness.        By  and  large  they  do  not   defend  God  or  his  justice,  though  they  occasionally  make  forays  in  that  direction  (e.g.  8:3;  22:12-­‐14;   25:2).     Job  defends  his  righteousness  and  is  thus  suspicious  about  God.      Job  advocates  an  anti-­‐theodicy  in  which   he  refuses  to  defend  God  or  make  excuses  for  him,  something  God  reprimands  him  for  in  40:8.    In  chap  31   Job  tries  to  make  God  present  his  own  theodicy.       Elihu  presents  a  theodicy  of  his  own,  an  “educative  theodicy”  in  which  God  uses  suffering  to  bring   problems  to  our  attention  so  they  can  be  addressed.    He  defends  the  justice  of  God  and  denies  Job’s   righteousness,  though  in  a  refined  way,  i.e.  by  redefining  the  retribution  principle  (preventative  not   remedial).         God’s  Response   God  .  .  .  clarifies  the  retribution  principle  by  understanding  it  in  proverbial  and  theological  terms,  i.e.  to   describe  what  God  is  like  and  as  reflective  of  human  experience  in  general.    The  principle  offers  no   guarantees,  though  it  does  reflect  God’s  character:  he  likes  bringing  prosperity  to  the  righteous  and   recognizes  a  responsibility  to  punish  the  wicked.    The  retribution  principle  is  “a  theological  principle  that   cannot  be  employed  either  for  assessment  of  God’s  character  (theodicy)  or  of  any  person’s  character.”     Because  it  isn’t  a  hard  and  fast  rule,  it  certainly  cannot  form  the  basis  for  any  judgment  that  a  prosperous   person  is  righteous  and  a  suffering  person  is  wicked.     Theodicy   The  book  also  offers  a  counter  theodicy:    “rather  than  defending  God’s  justice,  it  defends  his  wisdom.”      

                                                                                                                1  Here  I  follow  Walton,  “Retribution”  in  IVPDictionary  of  Wisdom  and  Writings.    

 

Lecture Notes on Theodicy in Job.pdf

the development of true, disinterested righteousness (“Does Job fear God for nothing?” [Job 1:9]). Thus the. retribution principle is called into question by ...

37KB Sizes 2 Downloads 237 Views

Recommend Documents

Lecture Notes on Graph Theory.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Lecture Notes on Graph Theory.pdf. Lecture Notes on Graph Theory.pdf. Open. Extract. Open with. Sign In. Mai

Lecture Notes on Mobile Communication
Indian Institute of Technology Guwahati .... 2.3.1 3G Standards and Access Technologies . ..... 8.1 Multiple Access Techniques for Wireless Communication .

Lecture Notes on Image Processing
Salem, Image Processing for Mechatronics Engineering, Winter Semester 2017. Lecture 2. 41. Image Arithmetic. • Image arithmetic has many uses in image processing for example, image subtraction. Image Arithmetic Saturation Rules: • The results of

Lecture Notes in Macroeconomics
Thus if the real interest rate is r, and the nominal interest rate is i, then the real interest rate r = i−π. ... M2 (M1+ savings accounts):$4.4 trillion. Remember that the ...

Lecture Notes in Applied Probability
B M S. There are 5 ways to fill the first position (i.e., Bill's mailbox), 4 ways to fill ..... cording to the “bullet” voting system, a voter must place 4 check marks on ...... 3.36 The Colorful LED Company manufacturers both green and red light

Lecture Notes in Mathematics
I spent the first years of my academic career at the Department of Mathe- matics at ... He is the one to get credit for introducing me to the field of graph complexes ... not 2-connected graphs along with yet another method for computing the.

Lecture Notes in Mathematics 1876
This field is the theory of sets, whose creator was Georg Cantor, . . . , this appears .... quixotic extremes as that of challenging the method of proof by reductio ad.

Lecture Notes in Computer Science
study aims to examine the effectiveness of alternative indicators based on wavelets, instead of some technical ..... In this paper, the energy, entropy and others of CJ(k), wavelet coefficients at level J, .... Max depth of initial individual program

Lecture Notes in Computer Science
forecasting by means of Financial Genetic Programming (FGP), a genetic pro- ... Address for correspondence: Jin Li, CERCIA, School of Computer Science, The ...

Lecture Notes in Computer Science
This is about twice the data generated in 1999, given an increasing ... the very same pre-processing tools and data have been used by all of them. We chose.

Lecture Notes in Computer Science
Abstract. In this paper, we present an approach for detecting and classifying attacks in computer networks by using neural networks. Specifically, a design of an intruder detection system is presented to protect the hypertext transfer protocol (HTTP)

Lecture Notes in Computer Science
... S and Geetha T V. Department of Computer Science and Engineering, .... concept than A. If the matching degree is unclassified then either concept A or B is.

Lecture Notes in Computer Science
tinct systems that are used within an enterprising organization. .... files and their networks of personal friends or associates, Meetup organizes local ..... ployed, and in a busy community any deleted pages will normally reappear if they are.

Inquisitive semantics lecture notes
Jun 25, 2012 - reformulated as a recursive definition of the set |ϕ|g of models over a domain. D in which ϕ is true relative to an assignment g. The inductive ...

Lecture Notes
1. CS theory. M a Compas 3-manifold. A page connetton of gange group G Gəvin)or SU(N). Sas - & + (AndA +š Anka A). G-O(N). SO(N) in this talk. - k integer .... T or Smains the same along row. 2) The # should s down the column. P P P P P spa, Az15)=

Lecture notes on strong approximation M. Lifshits
interested re der with suit le 4 pproxim tion tool ox4 r ther th n to fight in the ..... important in mathematical statistics and concerns the strong approximation of.

Lecture notes on Topology and Geometry Hu`ynh ...
3 Jan 2018 - who had his hair cut by the barber then we can't decide whether the barber himself is a member of that set .... Inquiry minds would have noted that we did not define the set of integers or the set of real numbers. ... There are rational

Lecture notes on empirical process theory
Oct 30, 2017 - This completes the proof. Lemma 5 ensures that a finite limit lims→t,s∈T0 X(s, ω) exists for every t ∈ T and ω ∈ Ω0. Define the stochastic process ˜X(t),t ∈ T by. ˜. X(t, ω) = { lims→t,s∈T0 X(s, ω) if t ∈ T,ω âˆ