1. Toward a Triangular Aesthetics
  2. Eric Gans, Trevor Cribben Merrill
  3. pp. 5-21
  4. restricted access View | Download |
  1. Çatalhöyük, Archaeology, Violence
  2. Christopher J. Knüsel, Bonnie Glencross
  3. pp. 23-36
  4. restricted access View | Download |
  1. Mimetic Euphemism and Mythology: Group Therapy, Scapegoating, and the Displacement of Disquiet
  2. Bruce A. Stevens, Scott Cowdell
  3. pp. 37-56
  4. restricted access View | Download |
  1. Mimesis, Ritual Sacrifice, and Ceremony of Proskynesis
  2. Desiderio Parrilla Martínez
  3. pp. 57-72
  4. restricted access View | Download |
  1. Contemplative Practice and the Therapy of Mimetic Desire
  2. Brian D. Robinette
  3. pp. 73-100
  4. restricted access View | Download |
  1. War and Politics: Clausewitz and Schmitt in the Light of Girard's Mimetic Theory
  2. Wolfgang Palaver, Gabriel Borrud
  3. pp. 101-117
  4. restricted access View | Download |
  1. After Sacrifice Ontology: The Shared Revelatory Dynamic of Heidegger and Girard
  2. Anthony W. Bartlett
  3. pp. 119-138
  4. restricted access View | Download |
  1. Rescuing Rhetoric: Kenneth Burke, René Girard, and Forms of Conversion
  2. Paul Lynch
  3. pp. 139-158
  4. restricted access View | Download |
  1. Girard and the "Sacrifice of the Mass": Mimetic Theory and Eucharistic Theology
  2. Anthony R. Lusvardi S.J.
  3. pp. 159-190
  4. restricted access View | Download |
  1. Human Evolution and the Single Victim Mechanism: Locating Girard's Hominization Hypothesis through Literature Survey
  2. Chris Haw
  3. pp. 191-216
  4. restricted access View | Download |
  1. Acquisitive Imitation and the Gift-Economy: Escaping Reciprocity in J. R. R. Tolkien's The Hobbit
  2. Joshua Hren
  3. pp. 217-231
  4. restricted access View | Download |
  1. From the Editor
  2. William A. Johnsen
  3. p. v
  4. restricted access View | Download |
  1. Introduction to "Toward a Triangular Aesthetics"
  2. Eric Gans
  3. pp. 1-3
  4. restricted access View | Download |
  1. Contributors
  2. pp. 233-236
  3. restricted access View | Download |