JHS New Article: Elie Assis, “Ze chariah 8 and its Allusions to J eremiah 30–33 and Deutero-Isaiah "
- Dear all,
I am glad to announce the publication of the following article in the Journal of Hebrew Scriptures (http://www.jhsonline.org)
Journal of Hebrew Scriptures - Volume 11: Article 1 (2011)
Elie Assis, “Zechariah 8 and its Allusions to Jeremiah 30–33 and Deutero-Isaiah"
This article argues that the first eight oracles in Zechariah 8:2-19 are based on the ideas and vocabulary of Jeremiah 30–33, while the last two oracles, vv 20–23, have no parallel in Jeremiah, but correspond to oracles of the anonymous prophet in Isaiah 40–66. Zechariah selectively used and adapted the material of his predecessors, in order to address the specific social and political reality of his generation. The ways in which this process was carried out are assessed in this article.
To access the article directly please go to http://www.arts.ualberta.ca/JHS/Articles/article_148.pdf
May I mention also the publication of the following review:
Anderson, Gary A., Sin: A History (New Haven: Yale University Press, 2009). (Reviewed by Micah D. Kiel)
The printed version of volume 9 (2009) has been published. For information please go to
For information about the printed version of volume 8 (2008) please go to
For information about the other volumes of the journal, please go to:
The Logos version of vol. 8 has been released. For information please go to http://www.logos.com/product/8765/journal-of-hebrew-scriptures-vol-8. For information about the Logos version of vols. 1-7, please go to http://www.logos.com/products/details/4336.
The Logos version of volume 9 of the journal is being prepared.
Ehud Ben Zvi
History and Classics
University of Alberta
2-28 HM Tory Building
Edmonton AB Canada T6G 2H4
** This communication is intended for the use of the recipient to whom it is addressed, and may contain confidential, personal, and/or privileged information. Please contact me immediately if you are not the intended recipient of this communication, and do not copy, distribute, or take action relying on it. Any communication received in error, or subsequent reply, should be deleted or destroyed.**