StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

When Is a Theft Not a Theft by Trainor - Essay Example

Cite this document
Summary
The author of the paper "When Is a Theft Not a Theft? by Trainor" tells that in the article, “When is theft, not a theft? Relic theft and the cult of the Buddha’s relics in Sri Lanka” by Kevin M. Trainor he understood how Buddha’s relics came to be distributed in the wider Sri Lanka region…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
When Is a Theft Not a Theft by Trainor
Read Text Preview

Extract of sample "When Is a Theft Not a Theft by Trainor"

Justified theft in the Buddhist tradition is committed to counter dishonesty. For example, I have witnessed Sakka commit a justified theft by stealing a stolen relic from Brahmin Dona, which would have resulted in the dishonor of Buddha’s relic. Additionally, the article depicts that, in Sri Lanka, there is a belief that a relic would disappear if it were not properly venerated. Essentially, the article demonstrates that a relic has the power to consent to its own theft, and this is better understood as a theft not being a theft (Trainor, 1992: p7).

  1. What did you find difficult to understand from the article?

I found difficulty in understanding why conflict would arise among the eight territorial clans because they all want to own part of the relic. I also do not understand the reason why the clans, would not settle on establishing a single location in which the whole of the relic would have been put to ensure easier veneration. Instead, they settled on dividing the relics among themselves, which resulted in some individuals stealing the relic while other clans became unsatisfied. Moreover, I come short of understanding why the followers of Buddhist tradition would resolve to violate the traditional principles just to own the relic of the founder of the tradition (Trainor, 1992: p12).

  1. What did the author do well, either in her argument or in her presentation?

The author did well, in the article, by providing a presentation that an introduction to how the Buddhist tradition came to have a number of venerated relics. He also depicted how the concept of “theft not theft” is established by providing various examples in Buddhist tradition and texts. Furthermore, his arguments are based on authoritative scriptural warrants, and thus, his article has arguments that are factual in nature. The presentation is chronological in the sense that it entails events that preceded the immediate death of Buddha. The article also enjoys a deep understanding of the Buddhist tradition and relics. Evidently, the author satisfactorily discussed how, in the Buddhist tradition, a theft that is not a theft is committed. He shows this by discussing that a relic is powerful in that it can only be stolen from a place where it is not properly venerated. Lastly, the author did well by pointing out problem areas in Buddhist tradition; firstly, the act of stealing is forbidden in the Buddhist tradition, but acts of stealing relics exist. Secondly, the act of being attached to a relic is against the Buddhist teaching of being attached to objects, which can be put under human possession and manipulation (Trainor, 1992: p20).

  1. What do you think the author could have done better?

The author could have done better by giving the discussion on relics a different approach apart from the concept of “theft not a theft”. The concept could have entailed something like “honoring a dishonored cause”. This would eliminate the negativity that has been associated with a tradition whose founder had attained a high degree of enlightenment. Additionally, the author would have justified the above premise by providing scriptural warrants from Buddhist tradition and text. This would have resulted in a positive depiction of Buddhist tradition and the idea of veneration (Trainor, 1992: p3).

 

  1. What personal reflections came to mind while reading the article?

Firstly, the personal reflection that came to my mind is a somewhat deeper understanding of the Buddhist tradition. The objective of the Buddhist tradition, which is to make a man an enlightened human being, was intriguing. For instance, while reading the article I reflected on how it would be if the world were full of enlightened people whose motives are not driven by materialistic or physical desires. Secondly, I had a reflection on how a relic can strengthen a tradition with followers from different clans even though the founder is dead. My reflection also entailed the supernatural power within the relic, which would make individuals resort to stealing while conflict arises among clans just to own part of Buddha’s relic. Lastly, I reflected on how Buddhists are deeply committed to their tradition to the extent that they would violate the tradition’s principles only to have an attachment to their founder.

  1. List of terms in the article that were unfamiliar

Most of the terms that were unfamiliar came from various texts that were from the Buddhist dialect. These are; “Mahaparinibbana-sutta”, “vamsa”, “sariram”, “Cakravartin”, “thupas”, “Tambapanni-therehivutta”, “naga-rajas”, “Buddhavamsa”, “paribhogika-dhatu”, “Mahavamsa”, “dipavamsa”, “sima”, “dakkhinakkhakam”, “dhatu-gatiko”, “adinnadana”, “pancasila”, “parajika”, “milindapanha”, “patihira”, “adhitthana”, “thupavamsa”, “amhakan saggamokkhatarayan karotha”, “dhatuvamsa”, “Abhidhamma” and “vinaya”.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Critique Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Critique Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/visual-arts-film-studies/1458197-critique
(Critique Essay Example | Topics and Well Written Essays - 750 Words)
Critique Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/visual-arts-film-studies/1458197-critique.
“Critique Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/visual-arts-film-studies/1458197-critique.
  • Cited: 0 times

CHECK THESE SAMPLES OF When Is a Theft Not a Theft by Trainor

The Impact of Closed-Circuit Television on Security

ne of the most considerate methods of ensuring the environment is free from theft, thugs, or any form of physical vandalism is through the use of CCTV security systems.... idden cameras help prevent a potential security threatMost financial investors admitted to have accepted the use of surveillance solutions in places easily put in place to monitor the cases of theft and vandalism....
8 Pages (2000 words) Research Paper

Increasing Vulnerability of Organizational Information Assets

These threats can cause massive destruction to organizations' resources in the forms of theft of organizational information, personal data theft, and a huge danger to corporate and personal information.... 2005): Spoofing and sniffing Denial of service attacks Identity theft Question 2: Contrast unintentional and deliberate threats to an information resource.... Hence, when the Internet turns out to be an important part of the business network, then the organization's information arrangements also become open for attacks from outsiders....
7 Pages (1750 words) Assignment

Effects of Identity Theft

Identity theft and Assumption Deterrence Act (ITADA) has defined identity theft as the knowing transfer, possession, or usage of any name or number that identifies another person, with the intent of committing or aiding or abetting a crime” (Roberts & Shreft, 2009, pp.... his theft has its effects varying from individual losses to insecurity pertaining to nationally relevant matters.... SU (2009, pp 7-8) has reported that the trend of identity theft had been on increase in 2008....
5 Pages (1250 words) Research Paper

Criminal Justice in Texas

"Criminal Justice in Texas" paper argues that any issue of criminal tendency cannot be fought individually.... Law enforcement agency TDCJ alone cannot fight the menace because of a lack of inspectors force as an area to be inspected is quite huge and funds are limited.... ... ... ... Texas Board of Criminal Justice (TBCJ) is the state umbrella agency under which all prison and prisoners' related activities are organized....
8 Pages (2000 words) Essay

The Issue of Identity Theft

"The Issue of Identity theft" paper highlights two major breaches of Heartland Payment Systems and the National Archive and Records Administration.... Fraudsters who indulge in identity theft in recent times have successfully stolen entire corporate identities.... Today Identity theft in the US is quite widespread causing huge problems for individuals.... are not unique like for instance fingerprints and can be misused when they fall into the wrong hands....
10 Pages (2500 words) Essay

Identity Theft in the Organization

This paper 'Identity theft in the Organization' discusses the issue of identity theft, how major institutions govern the information of clients and recommendations on how to stop identity theft.... Identity theft is defined as a situation in which a person steals the whole identity of a person.... This paper discusses the issue of identity theft, how major institutions govern the information of clients and additionally, recommendations on how to stop identity theft....
12 Pages (3000 words) Research Paper

Preventing Employee Theft in Retail

The present research proposal under the title "Preventing Employee theft In Retail" dwells on the prospect of employee theft which has revolved around public domains, with its impacts on business entities and economic advances being of great interest.... By definition, employee theft involves an act of unauthorized stealing or improper usage of company assets or information.... Thus far, the action occurs in a wide array of forms including, but not limited to, financial theft, time theft, and supplies theft....
7 Pages (1750 words) Research Proposal

Factors That Are Contributing to the Increasing Vulnerability of Organizational Information Assets

These threats can cause massive destruction to organizations' resources in the forms of theft of organizational information, personal data theft and a huge danger to corporate and personal information.... when the Internet turns out to be an important part of the business network, and most of the business tasks are supported by this network then the organization's information arrangements also become open for attacks from outsiders....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us