Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

For decades now, researchers have been debating how much influence, if any, Marlowe had on Shakespeare's work. In fact, some have even claimed that the two writers were the same person. 

But thanks to a culmination of mathematical analyses and hundreds of years of literary scholarship, including studies on Shakespeare's vocabulary, moral philosophies, and poetic style, an international group of researchers think they've finally put the mystery to bed once and for all.

The long-held suggestion that Christopher Marlowe was William Shakespeare is now widely dismissed, along with other authorship theories. But Marlowe is enjoying the next best thing, taking centre stage alongside his great Elizabethan rival with a credit as co-writer of the three Henry VI plays.

The two dramatists will appear jointly on each of the three title pages of the plays within the New Oxford Shakespeare, a landmark project to be published recently by Oxford University Press. Using old-fashioned scholarship and 21st-century computerised tools to analyse texts, the edition’s international scholars have contended that Shakespeare’s collaboration with other playwrights was far more extensive than has been realised until now.

Researchers believe that computerised textual analysis is now so sophisticated that they can even distinguish between Shakespeare writing under Marlowe’s influence and Marlowe writing alone. 
One piece of evidence identified five “Shakespeare-plus words”: gentle, answer, beseech, spoke, tonight.explained Gary Taylor a researcher from Florida State University: “What we mean by Shakespeare-plus is that we’ve looked at the frequency of certain words which might seem commonplace like ‘tonight’ in all the plays of that early period, say up to 1600. 

Anybody could use any of these words. They’re not words that Shakespeare invented. But we can say Shakespeare used ‘tonight’ much more often than other playwrights in those 20 years.
“Shakespeare-minus words … are much less likely to appear in a Shakespeare play. So, this is a statistical argument … not simply statistics about individual words, but combinations of individual words. With Marlowe, for example, combinations of words such as ‘glory droopeth’ appear to be unique to him in that period.
“Recent studies by specialists already agree that Shakespeare did not write the passage where Joan of Arc pleads for help from demonic spirits and then is captured by the English [Part One, 5.3, 5.4]. We have added new evidence from ‘unique n-grams’: that is, phrases that occur in the passage being tested. Marlowe’s works contain many more such parallels than any other playwright,” Taylor added. Other words and phrases identified as commonly occurring in Marlowe works include “familiar spirit, cull out, regions under earth, oh hold me, to your wonted, see, forsake me, droopeth to, curse, miscreant, ugly, change, shape thou, change my shape, suddenly surprise, your dainty, fell and enchantress”.

Taylor acknowledges that doubts may be cast on their conclusions: “You can’t say anything about Shakespeare without somebody disagreeing with you … But our knowledge of the past increases by debate of this kind.” 
Marlowe’s life of Myth and Mystery 
The life of Christopher Marlowe has long been pored over for evidence that he wrote a handful of William Shakespeare’s works. The scholar JB Steane said in 1969 there were so many rumours it would be absurd to dismiss them all as part of the “Marlowe Myth”.

Few undisputed facts exist about the playwright’s life, but he was baptised in Canterbury on 26 February 1564. The son of a shoemaker, Marlowe attended the King’s school in Canterbury before being awarded a scholarship to Corpus Christi College, Cambridge, where he received his BA degree in 1584.

Marlowe took lengthy absences and the university was about to refuse him a master’s degree when, in 1587, the Privy Council wrote to compliment his “good service” to the Queen on “matters touching the benefit of his country”. The letter prompted the theory that he had been a secret agent for Elizabeth I’s “spymaster”, Sir Francis Walsingham.
His plays were wildly popular for the brief period that he was on the Elizabethan literary scene. Dido, Queen of Carthage is thought to have been his first. Tamburlaine the Great, among the first English plays in blank verse, was written around 1587; the Jew of Malta, is thought to have been written around 1589, and Doctor Faustus was first performed between 1588 and 1593.

His death in Deptford in May 1593, aged 29, has provoked years of speculation, from the Queen ordering his assassination because of his atheism, to his being killed by a love rival. In 1925, the scholar Leslie Hotson published the coroner’s report in his book The Death of Christopher Marlowe. Witnesses testified that he was stabbed in the eye during a fight over payment of a bill and died instantly. The document did not end speculation, with some supporting the theory that Marlowe faked his death and continued to write as Shakespeare. 

ScienceAlert
 

 

 

 

« Eight Steps For Cloud Security
Current Cybercrime Threats Originate In Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

TeamSystem

TeamSystem

TeamSystem is a leading tech company in the market for digital business management solutions for companies and professionals.