<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[The Dish]]></provider_name><provider_url><![CDATA[http://dish.andrewsullivan.com]]></provider_url><author_name><![CDATA[Brendan James]]></author_name><author_url><![CDATA[https://dish.andrewsullivan.com/author/bjames0928/]]></author_url><title><![CDATA[The Authorship Algorithm]]></title><type><![CDATA[link]]></type><html><![CDATA[<h6>by Brendan James</h6>
<p>Patrick Juola <a href="http://www.scientificamerican.com/article.cfm?id=how-a-computer-program-helped-show-jk-rowling-write-a-cuckoos-calling">developed</a> a program that performs a mathematical analysis of literature; the software helped identify J.K. Rowling as the true author of <em><a href="http://www.amazon.com/gp/product/0316206849/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0316206849&amp;linkCode=as2&amp;tag=thdi09-20">The Cuckoo’s Calling</a>. </em>He considers the possible abuse of this kind of program:</p>
<blockquote><p>This technology is clearly a double-edged sword. If Rowling can be identified by computational analysis, what about whistleblowers? Is anyone safe from the modern equivalent of Sherlock’s all-seeing eye? For the moment, yes. The person who truly violated Rowling’s <a href="http://www.scientificamerican.com/topic.cfm?id=privacy">privacy</a> was not my computer or even the <em>Sunday Times</em> reporter, but the tipster who suggested the investigation in the first place. It’s simply not feasible to look at every potential author to see who might have written a book; without old-fashioned detective work (and informants), the haystack is still large enough that needles can successfully hide.</p></blockquote>
]]></html></oembed>