skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Emergence of sublinear scaling of firearm ownership in the United States
Abstract Recently, Succar and Porfiri (Nature Cities 1(3):216–224, 2024) reported sublinear scaling for firearm ownership in the United States. Their analysis hinted at a causal role of prevalence of homicides and firearm accessibility on firearm ownership, supporting self-protection as a driver of firearm ownership. In this study, we propose a microscopic, individual-level model to explain these macroscopic, city-level findings. In the model, individuals dwell in a city and buy a gun if they experience a violent interaction and know a dealer. We examine the model from a network science perspective and show the emergence of sublinear scaling with an exponent matching empirical observations. Beyond scaling, the model provides accurate predictions of city rankings in terms of firearm ownership, underscoring the explanatory power of the self-protection theory.  more » « less
Award ID(s):
1953135
PAR ID:
10555093
Author(s) / Creator(s):
;
Publisher / Repository:
Springer Science + Business Media
Date Published:
Journal Name:
Crime Science
Volume:
13
Issue:
1
ISSN:
2193-7680
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Ribeiro, Haroldo V (Ed.)
    In the realm of urban science, scaling laws are essential for understanding the relationship between city population and urban features, such as socioeconomic outputs. Ideally, these laws would be based on complete datasets; however, researchers often face challenges related to data availability and reporting practices, resulting in datasets that include only the highest observations of the urban features (top-k). A key question that emerges is: Under what conditions can an analysis based solely on top-kobservations accurately determine whether a scaling relationship is truly superlinear or sublinear? To address this question, we conduct a numerical study that explores how relying exclusively on reported values can lead to erroneous conclusions, revealing a selection bias that favors sublinear over superlinear scaling. In response, we develop a method that provides robust estimates of the minimum and maximum potential scaling exponents when only top-kobservations are available. We apply this method to two case studies involving firearm violence, a domain notorious for its suppressed datasets, and we demonstrate how this approach offers a reliable framework for analyzing scaling relationships with censored data. 
    more » « less
  2. Abstract Firearm injuries are a leading cause of death in the United States, surpassing fatalities from motor vehicle crashes. Despite this significant public health risk, Americans continue to purchase firearms in large quantities. Commonly cited drivers of firearm acquisition include fear of violent crime, fear of mass shootings, and panic-buying. Additionally, advocacy groups’ activity on social media may capitalize on emotions like fear and influence firearm acquisition. The simultaneous effects of these variables have not been explored in a causal framework. In this study, we aim to elucidate the causal roles of media coverage of firearm laws and regulations, media coverage of mass shootings, media coverage of violent crimes, and the Twitter activity of anti- and proregulation advocacy groups in short-term firearm acquisition in the United States. We collect daily time series for these variables from 2012 to 2020 and employ the PCMCI+ framework to investigate the causal structures among them simultaneously. Our results indicate that the Twitter activity of antiregulation advocacy groups directly drives firearm acquisitions. We also find that media coverage of firearm laws and regulations and media coverage of violent crimes influence firearm acquisition. Although media coverage of mass shootings and online activity of proregulation organizations are potential drivers of firearm acquisition, in the short term, only the lobbying efforts of antiregulation organizations on social media and specific media coverage appear to influence individuals’ decisions to purchase firearms. 
    more » « less
  3. Abstract Mass shootings (incidents with four or more people shot in a single event, not including the shooter) are becoming more frequent in the United States, posing a significant threat to public health and safety in the country. In the current study, we intended to analyze the impact of state-level prevalence of gun ownership on mass shootings—both the frequency and severity of these events. We applied the negative binomial generalized linear mixed model to investigate the association between gun ownership rate, as measured by a proxy (i.e., the proportion of suicides committed with firearms to total suicides), and population-adjusted rates of mass shooting incidents and fatalities at the state level from 2013 to 2022. Gun ownership was found to be significantly associated with the rate of mass shooting fatalities. Specifically, our model indicated that for every 1-SD increase—that is, for every 12.5% increase—in gun ownership, the rate of mass shooting fatalities increased by 34% (pvalue < 0.001). However, no significant association was found between gun ownership and rate of mass shooting incidents. These findings suggest that restricting gun ownership (and therefore reducing availability to guns) may not decrease the number of mass shooting events, but it may save lives when these events occur. 
    more » « less
  4. Abstract It has been proposed that microbial predator and prey densities are related through sublinear power laws. We revisited previously published biomass and abundance data and fitted Power‐law Biomass Scaling Relationships (PBSRs) between marine microzooplankton predators (Z) and phytoplankton prey (P), and marine viral predators (V) and bacterial prey (B). We analysed them assuming an error structure given by Type II regression models which, in contrast to the conventional Type I regression model, accounts for errors in both the independent and the dependent variables. We found that the data support linear relationships, in contrast to the sublinear relationships reported by previous authors. The scaling exponent yields an expected value of 1 with some spread in different datasets that was well‐described with a Gaussian distribution. Our results suggest that the ratiosZ/P, andV/Bare on average invariant, in contrast to the hypothesis that they systematically decrease with increasingPand B, respectively, as previously thought. 
    more » « less
  5. IntroductionBig graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors. MethodsWe propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers. ResultsThe TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 103−105times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost. DiscussionOur experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection. 
    more » « less