期刊论文详细信息
Frontiers in Psychology
Using Shakespeare's Sotto Voce to Determine True Identity From Text
Roger Bradbury1  David Kernot2  Terry Bossomaier3 
[1] National Security College, Australian National University, Canberra, ACT, Australia;National Security and ISR Division, Defence Science and Technology Group, Edinburgh, SA, Australia;The Centre for Research in Complex Systems, Charles Sturt University, Bathurst, NSW, Australia;
关键词: authorship identification;    personality;    sensory processing;    principal component analysis;    linear discriminant analysis;   
DOI  :  10.3389/fpsyg.2018.00289
来源: DOAJ
【 摘 要 】

Little is known of the private life of William Shakespeare, but he is famous for his collection of plays and poems, even though many of the works attributed to him were published anonymously. Determining the identity of Shakespeare has fascinated scholars for 400 years, and four significant figures in English literary history have been suggested as likely alternatives to Shakespeare for some disputed works: Bacon, de Vere, Stanley, and Marlowe. A myriad of computational and statistical tools and techniques have been used to determine the true authorship of his works. Many of these techniques rely on basic statistical correlations, word counts, collocated word groups, or keyword density, but no one method has been decided on. We suggest that an alternative technique that uses word semantics to draw on personality can provide an accurate profile of a person. To test this claim, we analyse the works of Shakespeare, Christopher Marlowe, and Elizabeth Cary. We use Word Accumulation Curves, Hierarchical Clustering overlays, Principal Component Analysis, and Linear Discriminant Analysis techniques in combination with RPAS, a multi-faceted text analysis approach that draws on a writer's personality, or self to identify subtle characteristics within a person's writing style. Here we find that RPAS can separate the known authored works of Shakespeare from Marlowe and Cary. Further, it separates their contested works, works suspected of being written by others. While few authorship identification techniques identify self from the way a person writes, we demonstrate that these stylistic characteristics are as applicable 400 years ago as they are today and have the potential to be used within cyberspace for law enforcement purposes.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:1次