Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

For decades now, researchers have been debating how much influence, if any, Marlowe had on Shakespeare's work. In fact, some have even claimed that the two writers were the same person. 

But thanks to a culmination of mathematical analyses and hundreds of years of literary scholarship, including studies on Shakespeare's vocabulary, moral philosophies, and poetic style, an international group of researchers think they've finally put the mystery to bed once and for all.

The long-held suggestion that Christopher Marlowe was William Shakespeare is now widely dismissed, along with other authorship theories. But Marlowe is enjoying the next best thing, taking centre stage alongside his great Elizabethan rival with a credit as co-writer of the three Henry VI plays.

The two dramatists will appear jointly on each of the three title pages of the plays within the New Oxford Shakespeare, a landmark project to be published recently by Oxford University Press. Using old-fashioned scholarship and 21st-century computerised tools to analyse texts, the edition’s international scholars have contended that Shakespeare’s collaboration with other playwrights was far more extensive than has been realised until now.

Researchers believe that computerised textual analysis is now so sophisticated that they can even distinguish between Shakespeare writing under Marlowe’s influence and Marlowe writing alone. 
One piece of evidence identified five “Shakespeare-plus words”: gentle, answer, beseech, spoke, tonight.explained Gary Taylor a researcher from Florida State University: “What we mean by Shakespeare-plus is that we’ve looked at the frequency of certain words which might seem commonplace like ‘tonight’ in all the plays of that early period, say up to 1600. 

Anybody could use any of these words. They’re not words that Shakespeare invented. But we can say Shakespeare used ‘tonight’ much more often than other playwrights in those 20 years.
“Shakespeare-minus words … are much less likely to appear in a Shakespeare play. So, this is a statistical argument … not simply statistics about individual words, but combinations of individual words. With Marlowe, for example, combinations of words such as ‘glory droopeth’ appear to be unique to him in that period.
“Recent studies by specialists already agree that Shakespeare did not write the passage where Joan of Arc pleads for help from demonic spirits and then is captured by the English [Part One, 5.3, 5.4]. We have added new evidence from ‘unique n-grams’: that is, phrases that occur in the passage being tested. Marlowe’s works contain many more such parallels than any other playwright,” Taylor added. Other words and phrases identified as commonly occurring in Marlowe works include “familiar spirit, cull out, regions under earth, oh hold me, to your wonted, see, forsake me, droopeth to, curse, miscreant, ugly, change, shape thou, change my shape, suddenly surprise, your dainty, fell and enchantress”.

Taylor acknowledges that doubts may be cast on their conclusions: “You can’t say anything about Shakespeare without somebody disagreeing with you … But our knowledge of the past increases by debate of this kind.” 
Marlowe’s life of Myth and Mystery 
The life of Christopher Marlowe has long been pored over for evidence that he wrote a handful of William Shakespeare’s works. The scholar JB Steane said in 1969 there were so many rumours it would be absurd to dismiss them all as part of the “Marlowe Myth”.

Few undisputed facts exist about the playwright’s life, but he was baptised in Canterbury on 26 February 1564. The son of a shoemaker, Marlowe attended the King’s school in Canterbury before being awarded a scholarship to Corpus Christi College, Cambridge, where he received his BA degree in 1584.

Marlowe took lengthy absences and the university was about to refuse him a master’s degree when, in 1587, the Privy Council wrote to compliment his “good service” to the Queen on “matters touching the benefit of his country”. The letter prompted the theory that he had been a secret agent for Elizabeth I’s “spymaster”, Sir Francis Walsingham.
His plays were wildly popular for the brief period that he was on the Elizabethan literary scene. Dido, Queen of Carthage is thought to have been his first. Tamburlaine the Great, among the first English plays in blank verse, was written around 1587; the Jew of Malta, is thought to have been written around 1589, and Doctor Faustus was first performed between 1588 and 1593.

His death in Deptford in May 1593, aged 29, has provoked years of speculation, from the Queen ordering his assassination because of his atheism, to his being killed by a love rival. In 1925, the scholar Leslie Hotson published the coroner’s report in his book The Death of Christopher Marlowe. Witnesses testified that he was stabbed in the eye during a fight over payment of a bill and died instantly. The document did not end speculation, with some supporting the theory that Marlowe faked his death and continued to write as Shakespeare. 

ScienceAlert
 

 

 

 

« Eight Steps For Cloud Security
Current Cybercrime Threats Originate In Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.