2nd Amendment, Firearms

Causes of variation in firearm homicide and suicide rates across states.

Firearm homicide rate vs state giffords rank

tl;dr: Treating firearm deaths as a whole obscures fundamental differences in the way homicides and suicides vary across states. Variation in the firearm homicide rate is best explained by racial differences between the states, with gun laws having no explanatory power. The variation in the firearm suicide rate is best explained by a combination of differences in gun laws, gun ownership, and racial origin.

One often hears the argument that states with stricter gun laws have fewer firearm deaths. This is true, as the following plot of firearm death rates against the Gifford Law Center 1 ranking of states according to the strength of their gun laws shows2:

Firearm death rate
Firearm death rate (all causes) per 100,000 per year plotted against the 2016 Gifford Law Center ranking of each state’s gun laws. Source: Gifford Law Center and CDC.

R²=0.5264 roughly means that differences in gun laws (as measured by the Gifford rank) “explains” 52.64% of the variation in firearm death rates between states. So certainly the strength (or weakness) of firearm laws correlates significantly with firearm death rates, as one might expect.

However, correlation does not imply causation, so let’s dig deeper. What happens if we just consider firearm homicides (i.e. leave aside suicides and other causes of firearm deaths)?

Firearm homicide rate vs state giffords rank
Firearm death rate (homicides only) per 100,000 per year plotted against the 2016 Gifford Law Center ranking of each state’s gun laws. Source: Gifford Law Center and CDC.

The predictive power of gun laws disappears completely for firearm homicides: only 1.19% of the variation between states is explained by differences in gun laws, and in fact that variation is not significant (t-stat of 0.77 for the statistically inclined).

What about suicides?

Firearm suicide rate vs state giffords rank
Firearm death rate (suicides only) per 100,000 per year plotted against the 2016 Gifford Law Center ranking of each state’s gun laws. Source:Gifford Law Center and CDC.

Here we see the origin of the predictive power of gun laws: stronger laws are correlated with fewer firearm suicides, with 62.25% of the variation in firearm suicide rates across states explained by differences in their gun laws. Later we will look into the predictive power of ownership and gun laws together — it turns out they are highly correlated, as one might expect. But first, let’s dig deeper into the homicides.

Explaining the Firearm Homicide Rate

If gun laws don’t explain the variation in firearm homicide rates between the states, what could? To answer this, take a look at the following chart showing the firearm homicide rate for the US, broken down by racial origin of the victim:

Firearm homicide rate by racial origin of the victim
Firearm homicide rate by racial origin of the victim, all US states. Source: CDC.

There is a large disparity between the firearm homicide rates for victims of differing racial origin. Since there is also a large variation in the racial makeup of the states, a reasonable initial hypothesis is that the variation in firearm homicide victim rates between the states might be explained in part by the differences in racial makeup of the states.

To test this hypothesis we construct a predictor of the firearm homicide rate for a state by multiplying the state’s population percentage of each racial group by the corresponding US-wide firearm homicide rate for the racial group, and summing them up. Call this the Racial Origin Predictor (ROP) (the linked spreadsheet has the details).

It turns out that almost all (78.5%) of the variation in firearm homicide rates between states is explained by racial origin:

Firearm Homicide Rate vs Racial Origin Predictor
Firearm Homicide Rate vs Racial Origin Predictor across all states. Source: CDC.

Explaining the Firearm Suicide Rate

Firearm suicide rates also vary significantly by racial origin:

Firearm suicide rate by racial origin of the victim
Firearm suicide rate by racial origin of the victim, all US states. Source: CDC..

Given this variation, and the success of the Racial Origin Predictor (ROP) for firearm homicides, we might expect similar success for the ROP when predicting suicides. Surprisingly, this turns out not to be the case, with the ROP only accounting for 20.15% of the variation in firearm suicide rates between states, compared to 78.5% for firearm homicide rates.

Another candidate predictor is the firearm ownership rate, which turns out to be highly correlated to the Gifford Law Center rank (62.8%) and explains 54.06% of the variation in suicide rates between states.

The following chart shows the relative predictive power of various combinations of predictors (the chart shows adjusted R² which accounts for the fact that multiple predictors will always fit better than single predictors, even if the additional predictors have no explanatory power):

Firearm suicide rate predictor power
Firearm suicide rate predictor power for all combinations of ROP, Ownership, and Gifford State Rank predictors. Source:CDC, Injury Prevention, and Gifford Law Center.

Although the Gifford rank and ownership are significantly correlated, they do appear to provide complementary information, as the predictor set with the most explanatory power is the combination of ROP, ownership, and Gifford rank, with an adjusted R² of 75%. We’ll call this predictor ROPOG.

Residual Analysis

Now that we have separate predictors for firearm homicide (ROP) and suicide (ROPOG) rates that each explain upwards of 75% of the variation between states, we can look at the outliers in the residuals to try and understand why some states outperform or underperform with respect to the predictor. The following map shows the residual ROP score (i.e. the difference between the ROP prediction and the actual firearm homicide rate in the state):

state homicide residuals
Map of state residuals from the ROP predictor of firearm homicide rate.

New York, Virginia and Georgia are the three most extreme negative outliers, with firearm homicide rates 2.40, 1.92, and 2.06 lower than the value predicted by ROP. Consistent with the lack of explanatory power of the Gifford rank for firearm homicide rates, while New York has a relatively low rank (i.e stricter gun laws) of 5, Virginia’s rank is 21 and Georgia’s is 29. It would be useful to understand what these latter two states are doing right, for whatever it is, it does not appear to be a function of their gun laws.

At the other end of the spectrum we have Missouri and Louisiana with firearm homicide rates 2.64 and 2.26 above their predicted values respectively. In this case gun laws may be part of the cause, as they rank 48th and 43rd respectively on the Gifford scale, and Missouri also has relatively low ownership of 27.1%.

Turning now to the the residuals for the firearm suicide rate predictor (ROPOG):

state suicide residuals
Map of state residuals from the ROPOG predictor of firearm suicide rate.

On the extreme lower-than-expected side we have Massachusetts (-3.16) and Hawaii (-2.62). Massachusetts is interesting because it is already low on ownership (22.6%) and strict on guns (Gifford rank 4), yet still manages to have far fewer firearm suicides than predicted. As with Virginia and Georgia, it would be useful to understand what Massachusetts may be doing right. Hawaii is reasonably strict on guns (Gifford rank 7), but has a lot of them (ownership of 45.1%), so one could be tempted to conclude that it is simply a very pleasant place to live.

There appears to be a significant geographical component associated with outlier states in terms of excess firearm suicides: they are overrepresented in the mountain states and west of the Rockies: Nevada (+3.54), Oklahoma (+3.30), Oregon (+3.05), Colorado (+2.98), Montana (+2.69), New Mexico (+2.55), Wyoming (+2.28). The only outlier state in the east of a similar magnitude is Delaware (+2.75).

  1. District of Columbia is not ranked by the Gifford Law Center — it was added manually to the data with a rank of 3 which appears consistent with their criteria. The results are not sensitive to its inclusion. []
  2. The data and calculations used in this study are available here. []

40 thoughts on “Causes of variation in firearm homicide and suicide rates across states.

  1. 80% Off On mythical being Charms jewelry. take advantage of special sale costs ffor the Pandora charms rings annd jewellery you
    like.
    Pandora charms Silver jewellery Outlet 80th Off. lovely mythical being handcrafted
    rings, earrings, and necklaces at outlet discount prices.

    Shop these Last chance designs. Pandora Outlet 80th Off currently.
    Pandora outlet sales hugh discount. Explore a lot of Pandora Pandora
    Charms deals.Pandora Outlet Sales|Shop pandora Up to eightieth Off pandora Sale‎.
    New Arrivals on the official mythical being. eighty Off Pandora Charms deals.
    PANDORA® jeweslry annd Charms.

  2. Hmm it appears lіke yoᥙr site ate mу first сomment (it
    wass extremely ⅼong) so I guess Ӏ’ll јust sum it up ѡһɑt I subhmitted
    ɑnd ѕay, I’m thoroughly enjoying yoսr blog. I tοo amm an aspiring blog writer
    ƅut Ӏ’m sill neww to еverything. Do you hawve ɑny suggestions fߋr first-time blog writers?
    Ӏ’d genuinely аppreciate іt.

  3. May I simply say what a comfort to uncover someone that actually knows what they’re talking about on the internet.
    You definitely realize how to bring an issue to light and make
    it important. A lot more people have to check this
    out and understand this side of the story. I can’t
    believe you are not more popular given that you most certainly possess
    the gift.

  4. Once your body begins to feel better, your cravings will naturally
    subside and you’ll be reaping the main advantages of decreasing the sugar inside your diet.

    You’re sure to find something suited for you and that you’ll enjoy.

    So far, exercise and balanced diets are thought as two of
    the main factors conducive to properly body.

  5. First of all I would like to say great blog! I had a quick question which
    I’d like to ask if you don’t mind. I was
    interested to know how you center yourself and clear your
    thoughts prior to writing. I’ve had a hard
    time clearing my mind in getting my ideas out. I do take pleasure in writing but it just seems like the first 10 to 15 minutes are lost just trying to figure
    out how to begin. Any recommendations or hints? Thanks!

  6. I used to be suggested this blog through my cousin. I am now not sure whether
    this post is written by him as nobody else know such distinctive approximately my trouble.
    You’re wonderful! Thank you!

  7. You really make it appear really easy along with your presentation however I to find this matter to
    be really something that I feel I would never
    understand. It sort of feels too complex and extremely large for
    me. I am having a look forward for your next post, I’ll try to get the dangle of it!

  8. Have you ever thought about writing an e-book or guest authoring on other websites?
    I have a blog based on the same subjects you discuss and would really like
    to have you share some stories/information. I know my audience would value your work.
    If you are even remotely interested, feel free to send me an e mail.

  9. Magnificent beat ! I wish to apprentice whilst you amend your web site, how could i subscribe for a weblog website?
    The account helped me a applicable deal. I had been tiny bit acquainted of this your broadcast offered bright transparent concept

  10. Do not play Solo– constantly search to your teammate.
    If a person attempts to suppress the black nation then you could retaliate by
    any type of and also all means feasible, additional search
    states that. Using a Smiley can perk up a conversation in any kind of
    conversation application. Select “OK” to obtain all the old conversation discussions back.
    Take pleasure in plain ten 2nd matchmaking prior to you reach
    leap best inti the fray. Greater than 50000000 is playing Mobile Legends: Bang bang now.
    Mobile Legends Counters isn’t really supported by Moonton and also
    does not reflect the sights or viewpoints of Moonton or any individual officially associated with handling
    or generating Mobile Legends: Bang Bang. I had
    no suggestion wee people were component of the Native American legends.
    By playing Mobile Legends on Bluestacks, it’s much easier to focus on the entire map.
    The New York Times defined their unfortunate
    tales in an immersive documents that could be downloaded for the mobile app
    and Google Cardboard. It is not an ideal FB application. Klph is an open source
    Android app for Facebook. The app syncs your conversations from any
    gadget, so you could maintain up the team garbage talk long after shattering the opponent nexus.
    I have checked as well as liked the app.

  11. you are actually a excellent webmaster. The web site loading pace is amazing.
    It sort of feels that you are doing any distinctive trick. Moreover, The contents are masterpiece.
    you have done a magnificent process in this matter!

    Để biết thêm chi tiết và những tin tức liên lạc đến máy phun sương hcm của Công ty
    TNHH Máy Phun Sương TMD. Mọi thắc mắc khúc mắc quý khách xin vui lòng liên lạc với
    đơn vị chúng tôi qua các thông tin bên dưới.
    Mọi băn khoăn sẽ được công ty chúng tôi giải đáp nhanh chóng,
    tận tình, tinh vi nhất mang đến sự hài lòng hoàn toàn từ phía quý khách.

    Công ty TNHH Giải Pháp Làm Mát TMD
    Trang chủ: mayphunsuonggiatot.vn
    Hotline:094.3399.084 – 0903.709.707
    Địa điểm: 314/24 Tô Ký, KP2, Tân Chánh Hiệp, Quận 12, TP.HCM

    Tags: hệ thống phun sương, hệ thống phun sương hcm

  12. Stage 1: Scan area device for Malware:

    This is an clear prevention, but frequently overlooked by most men and women. A bulk of consumers we converse to that have
    been target to a hack, earlier have experienced no protection products and solutions
    mounted on their devices and those that do
    far more typically than not, are installed out of the box, scarcely configured,
    overlooked about and seldom up to date.

    If you really don’t have a decent virus/malware solution mounted on your desktop.
    Make an knowledgeable obtain by discussing your unique desires with several suppliers.
    Be certain that it can be established to automatically scan your machine each and
    every day. Assure that at least every single 7 days it
    connects to the vendor’s internet site and updates itself with new libraries of virus and malware definitions.

    If you want to get reward details, set up program that permits you to observe your community website traffic and where you see odd outgoing requests, investigate.
    Your equipment must never be calling the outside environment without you either expressly having an action, or location up anything like a common down load of new virus definitions.
    If your device is randomly connecting to addresses or web pages you know very little about, then “Houston we have a difficulty!”

    Phase two: Rotate FTP passwords:

    File Transfer Protocol (FTP) supplies total access to your documents on the server.
    Like all passwords, you need to not set these and forget about them.
    They should really be updated often. We propose regular monthly if you
    accessibility your FTP often but if you accessibility it considerably less routinely it should really be all right.
    If you have under no circumstances modified passwords,
    we suggest that you update it now! You should really also have a fair password coverage.

    This includes:

    • DO NOT use the similar passwords for anything

    • DO NOT use dictionary words and phrases, or men and women names

    • DO NOT re-use the similar passwords. Once used and rolled, discard!

    • DO use a random password generator

    • DO use minimum of eight characters

    • DO use a blend of uppercase, lowercase,
    numbers and symbols.

    Step 3: Rotate database passwords:

    Your database password is what allows your web-site to access
    your database. It truly is not as important as rolling the admin password for your software or FTP specifics, but it is however an important part
    of a nicely-managed password coverage. We recommend bi-regular Password variations on this, even though you may well want to
    search far more or fewer depending on certain situation.

    The most probable state of affairs if database accessibility is compromised, is that
    a lousy male could produce a new admin consumer for your internet site, delete your databases wholly, or modify articles that is stored and served from the database.
    If you do adjust this password by means of a administration interface like the Webgyan Console or
    c Panel you need to recall that your web site has to have the new password
    configured into it. Generally you will have an interface for this, or some
    applications need you to edit a textual content based Configuration file on the
    server. It sounds complex, but once you know your way around, it is a five moment activity.

    Stage four: Take away access information:

    If you took your vehicle to the mechanic and remaining the spare keys so they can perform on it, you wouldn’t leave them the keys right
    after you decide on it up. Why would you leave complete entry to your internet site as soon as operate or modifications are accomplished?

    You ought to hand entry specifics out strictly on a necessary use basis.
    At the time the get the job done is accomplished go
    via Steps two, three and 14. If you have supplied area
    degree console obtain, also go as a result of Move five.

    Some of you don’t outsource your growth do the job and have focused IT workers.
    Any time a staff members member with a certain level of entry leaves, you must
    reset those people aspects immediately. Don’t forget, you are doing this not simply because they
    might deliberately do some thing unpleasant, in simple fact that is normally unlikely, but
    as a precaution in circumstance at some point in the potential their computer was exploited or compromised.

    We backup data so that in the situation of a disaster we are
    ready to get all buyers back online.

    Step five: Rotate ‘TheConsole’ (or cPanel) passwords:

    This is a pretty quick stage. Basically observe the guidelines
    to reset your control panel passwords. Use the exact same common perception as explained in Stage 2
    to set a much more tricky password.

    Stage six: Subscribe to exterior checking:

    This is like an insurance policies plan. Businesses
    like Protected do a Range of genuinely neat issues for you.
    They’re going to scan your site each and every day,
    and promptly alert you if you have been compromised.
    They offer expert services where by they will clean your
    site if you do get Compromised and you need instant support.

    If you are working with WordPress, they’ll do preventative checking for you,
    so you are alerted to updates in the software, plug-ins,
    themes and the like.

    Phase 7: Backup of web information:

    There is a idea that your hosting company will have backups ready and waiting around for you to obtain and can instantly recuperate all your shed
    information, with no any charge. Typically
    talking internet hosting vendors don’t do backups for the explanation you believe.
    We backup knowledge so that in the situation of a disaster we are ready to get
    all shoppers back on line. The backup measurements we offer with are
    in the many many Terra bytes. So I endorse in the strongest doable terms to BACKUP!

    It can be a very simple task, that will help save you from
    a good deal of headaches later. There are even purposes available that are equipped to backup.
    Backing up won’t have to occur daily, but with a chaotic site, weekly backups
    must be section of your technique. For sites that are static and modifications extremely not often, month to month backups are a lot more correct.
    No make any difference what schedule you decide to
    stick to, if negative points come about, you will
    at the very least have a copy of your website and you can conveniently re-publish rapidly, without stress and at no charge.
    So what are you ready for? If you’ve in no way backed up, do
    it now, then occur back!

    Move eight:Backup of database:

    This is just an extension of Action 7. If you have a website that signs up new end users,
    for instance an e-commerce site that necessitates consumers to sign up in advance
    of obtain you most likely current market to them,
    operate a loyalty method or have some form of reward scheme.
    What would transpire if all that information was deleted?
    If you have a fast paced web page, you may
    possibly make a decision weekly is as well infrequent and determine to archive a copy of your
    databases day-to-day.

    Again there are several resources offered that will do this for you instantly,
    especially if you are using incredibly prevalent databases technological
    know-how like MySQL. Restoring from a self-produced backup is a 5 moment task.

    Acquiring your web hosting supplier to trawl
    as a result of archives and do a restoration for you will go away you off the air for numerous several hours in a greatest-situation circumstance.

    Move nine:Critique software program for patches:

    You should pro-actively preserve your web page up to day as very best as is feasible.

    This one particular would seem to be self-explanatory but it is most likely the most common way for a
    site to get exploited and is mainly dismissed.
    It really is safe and sound to say that most people are likely to neglect to update their website, with the normal
    procedure of getting your web page built be a developer, which they then handover to you and that
    would be the past time the web page is up to date.
    Ever.

    We routinely see CMS or e-Commerce web sites that have not
    been current for 3+ a long time, and usually five a long time.
    So by the time a piece of software program is three yrs
    old, it’s generally ancient. If it really is then compromised,
    fixing it results in being 10x extra complicated, as there isn’t a straight-forward improve route
    from the variation you are on, to the most recent. It is hence, not just a simple patch put in alternatively trying to re-engineer
    the entire factor, whilst your web page

    is offline, and you are shedding income. This turns into a incredibly negative matter.
    Most application firms have mailing lists that
    you can subscribe to and they notify you each time safety vulnerabilities are uncovered, new patches and new variations and the like are readily
    available.

  13. Good day very cool website!! Man .. Beautiful ..
    Wonderful .. I’ll bookmark your website and take the feeds additionally?
    I’m happy to seek out a lot of useful information right here within the put up,
    we want develop more techniques on this regard, thank
    you for sharing. . . . . .

Leave a Reply

Your email address will not be published. Required fields are marked *