2021-2022-Revised-Catalog-1.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

2021-2022-Revised-Catalog-1.Pdf BELMONT ABBEY COLLEGE ______________________ Belmont, North Carolina Ut in Omnibus Glorificetur Deus That in All Things God May Be Glorified ACADEMIC CATALOG 2021-2022 Copyright © 2021 i The 2021-2022 catalog is dedicated to Fr. David Brown upon the occasion of his golden jubilee of monastic profession & in gratitude for his years of service as registrar ii Table of Contents General Information ........................................................................................... 1 Vision Statement......................................................................................... 1 Mission Statement ...................................................................................... 1 History ........................................................................................................ 2 Accreditation .............................................................................................. 1 Philosophy .................................................................................................. 1 Environment ............................................................................................... 5 Undergraduate Program ...................................................................................... 8 Admission Procedures ........................................................................................ 8 International Students ................................................................................. 8 Advanced Placement .................................................................................. 9 Transfer Students ...................................................................................... 11 Transfer of Credits .................................................................................... 11 Student Orientation ................................................................................... 12 Re-Admission to the College .................................................................... 12 Non-Discrimination Policy ....................................................................... 13 Office of Center for Continuing and Professional Studies ................................ 14 Summer Session (Residental and CCPS Students) ........................................... 18 Student Fees and Expenses ............................................................................... 19 Traditional Undergraduate Students ......................................................... 19 Center for Continuing and Professional Studies Students ......... 21 Withdrawals and Refunds ................................................................................. 23 Students Receiving Title IV Aid ............................................................... 24 Non-Title IV Funds .................................................................................. 24 Financial Assistance ......................................................................................... 27 Belmont Abbey College Scholarships and Grants .................................... 28 Academic Merit Programs ........................................................................ 28 Other Programs ......................................................................................... 29 Conditions of Award ................................................................................ 30 Application ............................................................................................... 30 Academic Programs and Policies (Residential Students Only) ......................... 32 Undergraduate Curriculum ....................................................................... 30 Undergraduate Degree Requirements ....................................................... 32 Essentials Courses .................................................................................... 32 Department Requirements ........................................................................ 33 Electives ................................................................................................... 33 Course Substitution Policy ....................................................................... 33 Major Fields of Study ............................................................................... 33 Declaration of Major ................................................................................ 34 Double Majors .......................................................................................... 34 Minors ...................................................................................................... 35 Academic Advising .................................................................................. 35 Change of Major or Advisor ..................................................................... 35 Class Attendance ...................................................................................... 36 Mandatory Roll-Taking ............................................................................ 36 iii College Assembly ..................................................................................... 36 Residency Requirement ............................................................................ 36 Registration ............................................................................................... 37 Course Schedule ....................................................................................... 37 Permission to Take Courses Elsewhere .................................................... 37 Dropping or Adding a Course ................................................................... 37 Pass/Fail Credits ....................................................................................... 38 Auditing Courses ...................................................................................... 38 Academic Probation.................................................................................. 38 Academic Dismissal ................................................................................. 39 Requirements for Re-Admission............................................................... 39 Appeal of Academic Dismissal ................................................................. 39 Student Complaint Policy and Procedures ................................................ 40 Intellectual Property.................................................................................. 42 Academic Dishonesty ............................................................................... 42 Grade Appeals .......................................................................................... 43 Student Use of Personal Electronic Devices in Class .............................. 44 Withdrawal from the College ................................................................... 45 Leave of Absence/Medical Withdrawal .................................................... 45 Classification of Students ......................................................................... 46 Grading System ........................................................................................ 46 Grade Conversion Table ........................................................................... 47 Grade Point Average................................................................................. 47 Grade Reports ........................................................................................... 47 Student Records and the Privacy Law .............................................................. 47 Permanent Records ................................................................................... 47 Access to Student Records ........................................................................ 48 Academic Recognition ..................................................................................... 51 Academic Awards ..................................................................................... 51 Honor Societies......................................................................................... 52 Graduation ........................................................................................................ 53 Participation in Graduation ....................................................................... 53 Persistence Rates ...................................................................................... 53 Graduation Honors ................................................................................... 53 Deficiencies for Graduation ...................................................................... 53 Major Capstones ....................................................................................... 53 Second Bachelor’s Degrees ...................................................................... 54 Special Academic Programs ............................................................................. 54 Academic Assistance ................................................................................ 54 Career Services and Internships ................................................................ 54 Honors College ......................................................................................... 56 Saint Thomas More Scholarship Program ................................................ 57 Military Science/ROTC ............................................................................ 57 Pre-Professional Programs ........................................................................ 57 Accessibility
Recommended publications
  • Religious Practices in the Workplace
    Occasional Paper 3 Religious Practices in the Workplace BY SIMON WEBLEY Published by the Institute of Business Ethics 3 r e p a P l a n o i s a c c O Author Simon Webley is Research Director at the Institute of Business Ethics. He has published a number of studies on business ethics, the more recent being: Making Business Ethics Work (2006), Use of Codes of Ethics in Business (2008), and Employee Views of Ethics at Work: The 2008 National Survey (2009). Acknowledgements A number of people helped with this paper. Thank you to the research team at the Institute: Nicole Dando, Judith Irwin and Sabrina Basran. Katherine Bradshaw and Philippa Foster Back challenged my approach to the topic with constructive comments. Paul Woolley (Ethos), Denise Keating and Alan Beazley (Employers Forum on Belief) and Paul Hyman (Rolls Royce, UK) and Charles Giesting (Roll Royce, US) reviewed the penultimate draft providing suggestions all of which I think helped to root the paper in reality. Finally, I am grateful to the Tannenbaum Center for Interreligious Understanding in New York for permission to reproduce their Religious Diversity Checklist in an Appendix. Thank you to them all. All rights reserved. To reproduce or transmit this book in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, please obtain prior permission in writing from the publisher. Religious Practices in the Workplace Price £10 ISBN 978-0-9562183-5-3 © IBE www.ibe.org.uk First published March 2011 by the Institute of Business Ethics 24 Greencoat Place London SW1P 1BE The Institute’s website (www.ibe.org.uk) provides information on IBE publications, events and other aspects of its work.
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers DJ Bernstein Thanks To
    Comparison of Cipher implementations 256-bit stream ciphers from cipher authors D. J. Bernstein Timing tools Thanks to: (De Canni`ere) University of Illinois at Chicago Denmark Technical University Timings Alfred P. Sloan Foundation on various machines Graphing tools (Bernstein) Speed graphs in this talk Comparison of Cipher implementations Security disasters 256-bit stream ciphers from cipher authors Attack claimed on YAMB: “258.” D. J. Bernstein 72 Timing tools Attack claimed on Py: “2 .” Thanks to: (De Canni`ere) Presumably also Py6. University of Illinois at Chicago Attack claimed on SOSEMANUK: Denmark Technical University Timings “2226.” Alfred P. Sloan Foundation on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters from cipher authors Attack claimed on YAMB: “258.” 72 Timing tools Attack claimed on Py: “2 .” (De Canni`ere) Presumably also Py6. Attack claimed on SOSEMANUK: Timings “2226.” on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters Speed disasters from cipher authors Attack claimed on YAMB: “258.” FUBUKI is slower than AES 72 in all of these benchmarks. Timing tools Attack claimed on Py: “2 .” Any hope of faster FUBUKI? (De Canni`ere) Presumably also Py6. If not: Reject FUBUKI. Attack claimed on SOSEMANUK: VEST is extremely slow Timings “2226.” on various machines in all of these benchmarks. Is there any dispute On the other hand, Graphing tools about these attacks? VEST is claimed to be (Bernstein) If not: Reject YAMB etc.
    [Show full text]
  • Clergy Sexual Abuse: Annotated Bibliography of Conceptual and Practical Resources
    Clergy Sexual Abuse: Annotated Bibliography of Conceptual and Practical Resources. Preface The phenomenon of sexual abuse as committed by persons in fiduciary relationships is widespread among helping professions and is international in scope. This bibliography is oriented to several specific contexts in which that phenomenon occurs. The first context is the religious community, specifically Christian churches, and particularly in the U.S. This is the context of occurrence that I best know and understand. The second context for the phenomenon is the professional role of clergy, a religious vocation and culture of which I am a part. While the preponderance of sources cited in this bibliography reflect those two settings, the intent is to be as comprehensive as possible about sexual boundary violations within the religious community. Many of the books included in this bibliography were obtained through interlibrary loan services that are available at both U.S. public and academic libraries. Many of the articles that are listed were obtained through academic libraries. Daily newspaper media sources are generally excluded from this bibliography for practical reasons due to the large quantity, lack of access, and concerns about accuracy and completeness. In most instances, author descriptions and affiliations refer to status at time of publication. In the absence of a subject or name index for this bibliography, the Internet user may trace key words in this PDF format through the standard find or search feature that is available as a pull-down menu option on the user’s computer. The availability of this document on the Internet is provided by AdvocateWeb, a nonprofit corporation that serves an international community and performs an exceptional service for those who care about this topic.
    [Show full text]
  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Henricksen, Matthew& Dawson, Edward (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Lecture Notes in Computer Science, 4058, Article number: AISP52-63. This file was downloaded from: https://eprints.qut.edu.au/24788/ c Consult author(s) regarding copyright matters This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/11780656_5 Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond Matt Henricksen and Ed Dawson Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland, 4001, Australia.
    [Show full text]
  • Ecce Mater Tua Vol. 1
    Ecce Mater Tua A Journal of Mariology VOL. 1 January 1, 2018 Solemnity of Mary the Mother of God Editorial Board Editor Dr. Mark Miravalle, S.T.D. Franciscan University of Steubenville, Ohio Associate Editor Mr. Kevin Clarke, Ph.D. (cand.) Ave Maria University, Florida Advisory Board Msgr. Arthur Calkins, S.T.D. Vatican Ecclesia Dei, Emeritus Fr. Giles Dimock, O.P., S.T.D. Pontifical University of St. Thomas Aquinas (Angelicum), Emeritus Robert Fastiggi, S.T.D. Sacred Heart Major Seminary, Michigan Fr. Peter D. Fehlner, O.F.M. Conv. Ellicott City, Maryland Dr. Luis Bejar Fuentes Independent Editor and Journalist Mr. Daniel Garland, Jr., Ph.D. (cand.) Institute for Catholic Culture Scott Hahn, Ph.D. Franciscan University of Steubenville, Ohio Dr. Stephen Miletic Franciscan University of Steubenville, Ohio Christopher Malloy, Ph.D. University of Dallas, Texas John-Mark Miravalle, S.T.D. Mount St. Mary’s Seminary, Maryland Petroc Willey, Ph.D. Franciscan University of Steubenville, Ohio ii Ecce Mater Tua iii Ecce Mater Tua: A Journal of Mariology ISSN: 2573-5799 Instructions for Authors: To submit a paper for consideration, please first make sure that all personal references are stripped from the text and file properties, then email the document in Microsoft Word format (.doc or .docx) or in rich-text format (.rtf) to [email protected]. To ensure a smooth editorial process, please include a 250-350 word abstract at the beginning of the article, and be sure that formatting follows Chicago style. Ecce Mater Tua practices blind review. Submissions are evaluated anonymously by members of the editorial board and other scholars with appropriate expertise.
    [Show full text]
  • New Results of Related-Key Attacks on All Py-Family of Stream Ciphers
    Journal of Universal Computer Science, vol. 18, no. 12 (2012), 1741-1756 submitted: 15/9/11, accepted: 15/2/12, appeared: 28/6/12 © J.UCS New Results of Related-key Attacks on All Py-Family of Stream Ciphers Lin Ding (Information Science and Technology Institute, Zhengzhou, China [email protected]) Jie Guan (Information Science and Technology Institute, Zhengzhou, China [email protected]) Wen-long Sun (Information Science and Technology Institute, Zhengzhou, China [email protected]) Abstract: The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family of stream ciphers. At Indocrypt 2007, Sekar, Paul and Preneel showed related-key weaknesses in the Py-family of stream ciphers including the strongest member TPypy. Furthermore, they modified the stream ciphers TPypy and TPy to generate two fast ciphers, namely RCR-32 and RCR-64, in an attempt to rule out all the attacks against the Py-family of stream ciphers. So far there exists no attack on RCR-32 and RCR-64. In this paper, we show that the related-key weaknesses can be still used to construct related-key distinguishing attacks on all Py-family of stream ciphers including the modified versions RCR- 32 and RCR-64. Under related keys, we show distinguishing attacks on RCR-32 and RCR-64 with data complexity 2139.3 and advantage greater than 0.5. We also show that the data complexity of the distinguishing attacks on Py-family of stream ciphers proposed by Sekar et al. can be reduced from 2193.7 to 2149.3 .
    [Show full text]
  • ANNI ACADEMICI 2020-2021 INSTITUTUM PATRISTICUM AUGUSTINIANUM Via Paolo VI, 25 00193 Roma Tel
    ORDO ANNI ACADEMICI 2020-2021 INSTITUTUM PATRISTICUM AUGUSTINIANUM Via Paolo VI, 25 00193 Roma tel. + 39 06 680069 Sito internet http://www.patristicum.org email Segreteria Generale [email protected] tel. Segreteria Generale + 39 06 68006238 AUTORITÀ ACCADEMICHE Gran Cancelliere della Pontificia Università Lateranense Em.mo Rev.mo Sig. Card. ANGELO DE DONATIS Vicario Generale di Sua Santità per la Diocesi di Roma Rettore Magnifico Ch.mo Prof. VINCENZO BUONOMO Moderatore Generale P. ALEJANDRO MORAL ANTÓN, OSA Rev.mo Priore generale dell’Ordine di Sant’Agostino Preside Rev.do P. GIUSEPPE CARUSO, OSA Vice Preside Rev.do P. JUAN ANTONIO CABRERA MONTERO, OSA UFFICIALI Segretario Generale Rev.do P. AMADO LLORENTE ABANZAS, OSA Bibliotecario Rev.do P. KOLAWOLE CHABI, OSA Economo Rev.do P. AMADO LLORENTE ABANZAS, OSA NOTIZIE STORICHE E VITA DELL’ISTITUTO NOTIZIE STORICHE E VITA DELL’ISTITUTO 7 NOTIZIE STORICHE E VITA DELL’ISTITUTO 1. Le origini STORICHE NOTIZIE L’ Institutum Patristicum Augustinianum di Roma, nel coltivare le scienze sacre, in particolare il pensiero dei Padri della Chiesa, quello di sant’Agostino e della sua eredità, si muove nell’ambito della plurisecolare tradizione dell’Ordine agostiniano che, fin dalla sua fondazione da parte della Sede Apostolica nel corso del secolo XIII, ha sempre dedicato una particolare attenzione agli stu- di. Gli agostiniani coltivarono le discipline sacre con tanto impegno che, già negli ultimi decenni del secolo che li vide nascere, ebbero a Parigi, Oxford, Cambridge, Bologna e in altre principali università europee una posizione ragguardevole, esprimendo maestri di primo piano come Egidio Romano, Giacomo da Viterbo, Gregorio da Rimini, Tommaso da Strasburgo, Agostino da Ancona e molti altri (cfr.
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • Encyclopedia of Ancient Christianity
    ENCYCLOPEDIA OF ANCIENT CHRISTIANITY EAC Vol.1 A-E.indb 1 1/21/14 10:03 AM Publication of the Encyclopedia of Ancient Christianity has been made possible in part by the generous support of the Green Scholars Initiative. EAC Vol.1 A-E.indb 2 1/21/14 10:03 AM ENCYCLOPEDIA OF ANCIENT CHRISTIANITY Produced by the Institutum Patristicum Augustinianum VOLUME ONE A–E general editor Angelo Di Berardino consulting editors Thomas C. Oden Joel C. Elowsky project editor James Hoover principal translators Joseph T. Papa Erik A. Koenke Eric E. Hewett EAC Vol.1 A-E.indb 3 1/21/14 10:03 AM InterVarsity Press P.O. Box 1400, Downers Grove, IL 60515-1426 Internet: www.ivpress.com Email: [email protected] English Translation ©2014 InterVarsity Christian Fellowship/USA Translated from the Italian Nuovo dizionario patristico e di antichità cristiane, 3 volumes, ©2006–2008 Casa Editrice Marietti, S.p.A., Genova-Milano. Published in the United States of America by InterVarsity Press, Downers Grove, Illinois, with permission from Casa Editrice Marietti. All rights reserved. No part of this book may be reproduced in any form without written permission from InterVarsity Press. InterVarsity Press® is the book-publishing division of InterVarsity Christian Fellowship/USA®, a movement of students and faculty active on campus at hundreds of universities, colleges and schools of nursing in the United States of America, and a member movement of the International Fellowship of Evangelical Students. For information about local and regional activities, write Public Relations Dept., InterVarsity Christian Fellowship/USA, 6400 Schroeder Rd., P.O.
    [Show full text]
  • Religion and Attitudes to Corporate Social Responsibility in a Large Cross-Country Sample Author(S): S
    Religion and Attitudes to Corporate Social Responsibility in a Large Cross-Country Sample Author(s): S. Brammer, Geoffrey Williams and John Zinkin Source: Journal of Business Ethics, Vol. 71, No. 3 (Mar., 2007), pp. 229-243 Published by: Springer Stable URL: http://www.jstor.org/stable/25075330 . Accessed: 11/04/2013 16:12 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]. Springer is collaborating with JSTOR to digitize, preserve and extend access to Journal of Business Ethics. http://www.jstor.org This content downloaded from 141.161.133.194 on Thu, 11 Apr 2013 16:12:39 PM All use subject to JSTOR Terms and Conditions Journal of Business Ethics (2007) 71:229-243 ? Springer 2006 DOI 10.1007/sl0551-006-9136-z and Attitudes to Corporate Religion S. Brammer Social in a Responsibility Large GeoffreyWilliams Cross-Country Sample John Zinkin ABSTRACT. This paper explores the relationship of the firm and that which is required by law" between denomination and individual attitudes religious (McWilliams and Siegel (2001) has become a more to Social within the Corporate Responsibility (CSR) salient aspect of corporate competitive contexts. context of a large sample of over 17,000 individuals In this climate, organised religion has sought to two drawn from 20 countries.
    [Show full text]
  • Jain Philosophy and Practice I 1
    PANCHA PARAMESTHI Chapter 01 - Pancha Paramesthi Namo Arihantänam: I bow down to Arihanta, Namo Siddhänam: I bow down to Siddha, Namo Äyariyänam: I bow down to Ächärya, Namo Uvajjhäyänam: I bow down to Upädhyäy, Namo Loe Savva-Sähunam: I bow down to Sädhu and Sädhvi. Eso Pancha Namokkäro: These five fold reverence (bowings downs), Savva-Pävappanäsano: Destroy all the sins, Manglänancha Savvesim: Amongst all that is auspicious, Padhamam Havai Mangalam: This Navakär Mantra is the foremost. The Navakär Mantra is the most important mantra in Jainism and can be recited at any time. While reciting the Navakär Mantra, we bow down to Arihanta (souls who have reached the state of non-attachment towards worldly matters), Siddhas (liberated souls), Ächäryas (heads of Sädhus and Sädhvis), Upädhyäys (those who teach scriptures and Jain principles to the followers), and all (Sädhus and Sädhvis (monks and nuns, who have voluntarily given up social, economical and family relationships). Together, they are called Pancha Paramesthi (The five supreme spiritual people). In this Mantra we worship their virtues rather than worshipping any one particular entity; therefore, the Mantra is not named after Lord Mahävir, Lord Pärshva- Näth or Ädi-Näth, etc. When we recite Navakär Mantra, it also reminds us that, we need to be like them. This mantra is also called Namaskär or Namokär Mantra because in this Mantra we offer Namaskär (bowing down) to these five supreme group beings. Recitation of the Navakär Mantra creates positive vibrations around us, and repels negative ones. The Navakär Mantra contains the foremost message of Jainism. The message is very clear.
    [Show full text]