Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

For decades now, researchers have been debating how much influence, if any, Marlowe had on Shakespeare's work. In fact, some have even claimed that the two writers were the same person. 

But thanks to a culmination of mathematical analyses and hundreds of years of literary scholarship, including studies on Shakespeare's vocabulary, moral philosophies, and poetic style, an international group of researchers think they've finally put the mystery to bed once and for all.

The long-held suggestion that Christopher Marlowe was William Shakespeare is now widely dismissed, along with other authorship theories. But Marlowe is enjoying the next best thing, taking centre stage alongside his great Elizabethan rival with a credit as co-writer of the three Henry VI plays.

The two dramatists will appear jointly on each of the three title pages of the plays within the New Oxford Shakespeare, a landmark project to be published recently by Oxford University Press. Using old-fashioned scholarship and 21st-century computerised tools to analyse texts, the edition’s international scholars have contended that Shakespeare’s collaboration with other playwrights was far more extensive than has been realised until now.

Researchers believe that computerised textual analysis is now so sophisticated that they can even distinguish between Shakespeare writing under Marlowe’s influence and Marlowe writing alone. 
One piece of evidence identified five “Shakespeare-plus words”: gentle, answer, beseech, spoke, tonight.explained Gary Taylor a researcher from Florida State University: “What we mean by Shakespeare-plus is that we’ve looked at the frequency of certain words which might seem commonplace like ‘tonight’ in all the plays of that early period, say up to 1600. 

Anybody could use any of these words. They’re not words that Shakespeare invented. But we can say Shakespeare used ‘tonight’ much more often than other playwrights in those 20 years.
“Shakespeare-minus words … are much less likely to appear in a Shakespeare play. So, this is a statistical argument … not simply statistics about individual words, but combinations of individual words. With Marlowe, for example, combinations of words such as ‘glory droopeth’ appear to be unique to him in that period.
“Recent studies by specialists already agree that Shakespeare did not write the passage where Joan of Arc pleads for help from demonic spirits and then is captured by the English [Part One, 5.3, 5.4]. We have added new evidence from ‘unique n-grams’: that is, phrases that occur in the passage being tested. Marlowe’s works contain many more such parallels than any other playwright,” Taylor added. Other words and phrases identified as commonly occurring in Marlowe works include “familiar spirit, cull out, regions under earth, oh hold me, to your wonted, see, forsake me, droopeth to, curse, miscreant, ugly, change, shape thou, change my shape, suddenly surprise, your dainty, fell and enchantress”.

Taylor acknowledges that doubts may be cast on their conclusions: “You can’t say anything about Shakespeare without somebody disagreeing with you … But our knowledge of the past increases by debate of this kind.” 
Marlowe’s life of Myth and Mystery 
The life of Christopher Marlowe has long been pored over for evidence that he wrote a handful of William Shakespeare’s works. The scholar JB Steane said in 1969 there were so many rumours it would be absurd to dismiss them all as part of the “Marlowe Myth”.

Few undisputed facts exist about the playwright’s life, but he was baptised in Canterbury on 26 February 1564. The son of a shoemaker, Marlowe attended the King’s school in Canterbury before being awarded a scholarship to Corpus Christi College, Cambridge, where he received his BA degree in 1584.

Marlowe took lengthy absences and the university was about to refuse him a master’s degree when, in 1587, the Privy Council wrote to compliment his “good service” to the Queen on “matters touching the benefit of his country”. The letter prompted the theory that he had been a secret agent for Elizabeth I’s “spymaster”, Sir Francis Walsingham.
His plays were wildly popular for the brief period that he was on the Elizabethan literary scene. Dido, Queen of Carthage is thought to have been his first. Tamburlaine the Great, among the first English plays in blank verse, was written around 1587; the Jew of Malta, is thought to have been written around 1589, and Doctor Faustus was first performed between 1588 and 1593.

His death in Deptford in May 1593, aged 29, has provoked years of speculation, from the Queen ordering his assassination because of his atheism, to his being killed by a love rival. In 1925, the scholar Leslie Hotson published the coroner’s report in his book The Death of Christopher Marlowe. Witnesses testified that he was stabbed in the eye during a fight over payment of a bill and died instantly. The document did not end speculation, with some supporting the theory that Marlowe faked his death and continued to write as Shakespeare. 

ScienceAlert
 

 

 

 

« Eight Steps For Cloud Security
Current Cybercrime Threats Originate In Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Vijilan Security

Vijilan Security

Vijilan provides 24/7 SOC services to MSPs/VARs. Our Security Operations Center is global, and our services are exclusive to the Channel.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.