Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

For decades now, researchers have been debating how much influence, if any, Marlowe had on Shakespeare's work. In fact, some have even claimed that the two writers were the same person. 

But thanks to a culmination of mathematical analyses and hundreds of years of literary scholarship, including studies on Shakespeare's vocabulary, moral philosophies, and poetic style, an international group of researchers think they've finally put the mystery to bed once and for all.

The long-held suggestion that Christopher Marlowe was William Shakespeare is now widely dismissed, along with other authorship theories. But Marlowe is enjoying the next best thing, taking centre stage alongside his great Elizabethan rival with a credit as co-writer of the three Henry VI plays.

The two dramatists will appear jointly on each of the three title pages of the plays within the New Oxford Shakespeare, a landmark project to be published recently by Oxford University Press. Using old-fashioned scholarship and 21st-century computerised tools to analyse texts, the edition’s international scholars have contended that Shakespeare’s collaboration with other playwrights was far more extensive than has been realised until now.

Researchers believe that computerised textual analysis is now so sophisticated that they can even distinguish between Shakespeare writing under Marlowe’s influence and Marlowe writing alone. 
One piece of evidence identified five “Shakespeare-plus words”: gentle, answer, beseech, spoke, tonight.explained Gary Taylor a researcher from Florida State University: “What we mean by Shakespeare-plus is that we’ve looked at the frequency of certain words which might seem commonplace like ‘tonight’ in all the plays of that early period, say up to 1600. 

Anybody could use any of these words. They’re not words that Shakespeare invented. But we can say Shakespeare used ‘tonight’ much more often than other playwrights in those 20 years.
“Shakespeare-minus words … are much less likely to appear in a Shakespeare play. So, this is a statistical argument … not simply statistics about individual words, but combinations of individual words. With Marlowe, for example, combinations of words such as ‘glory droopeth’ appear to be unique to him in that period.
“Recent studies by specialists already agree that Shakespeare did not write the passage where Joan of Arc pleads for help from demonic spirits and then is captured by the English [Part One, 5.3, 5.4]. We have added new evidence from ‘unique n-grams’: that is, phrases that occur in the passage being tested. Marlowe’s works contain many more such parallels than any other playwright,” Taylor added. Other words and phrases identified as commonly occurring in Marlowe works include “familiar spirit, cull out, regions under earth, oh hold me, to your wonted, see, forsake me, droopeth to, curse, miscreant, ugly, change, shape thou, change my shape, suddenly surprise, your dainty, fell and enchantress”.

Taylor acknowledges that doubts may be cast on their conclusions: “You can’t say anything about Shakespeare without somebody disagreeing with you … But our knowledge of the past increases by debate of this kind.” 
Marlowe’s life of Myth and Mystery 
The life of Christopher Marlowe has long been pored over for evidence that he wrote a handful of William Shakespeare’s works. The scholar JB Steane said in 1969 there were so many rumours it would be absurd to dismiss them all as part of the “Marlowe Myth”.

Few undisputed facts exist about the playwright’s life, but he was baptised in Canterbury on 26 February 1564. The son of a shoemaker, Marlowe attended the King’s school in Canterbury before being awarded a scholarship to Corpus Christi College, Cambridge, where he received his BA degree in 1584.

Marlowe took lengthy absences and the university was about to refuse him a master’s degree when, in 1587, the Privy Council wrote to compliment his “good service” to the Queen on “matters touching the benefit of his country”. The letter prompted the theory that he had been a secret agent for Elizabeth I’s “spymaster”, Sir Francis Walsingham.
His plays were wildly popular for the brief period that he was on the Elizabethan literary scene. Dido, Queen of Carthage is thought to have been his first. Tamburlaine the Great, among the first English plays in blank verse, was written around 1587; the Jew of Malta, is thought to have been written around 1589, and Doctor Faustus was first performed between 1588 and 1593.

His death in Deptford in May 1593, aged 29, has provoked years of speculation, from the Queen ordering his assassination because of his atheism, to his being killed by a love rival. In 1925, the scholar Leslie Hotson published the coroner’s report in his book The Death of Christopher Marlowe. Witnesses testified that he was stabbed in the eye during a fight over payment of a bill and died instantly. The document did not end speculation, with some supporting the theory that Marlowe faked his death and continued to write as Shakespeare. 

ScienceAlert
 

 

 

 

« Eight Steps For Cloud Security
Current Cybercrime Threats Originate In Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.