“…We describe this in Section 2.3 and use it in the empirical part. An alternative solution is in the use of synthetic data and a related notion of differential privacy, for example, Dwork and Nissim (2004), Dwork (2006), and Abowd and Vilhuber (2008), as well as Duncan and Lambert (1986), Duncan and Mukherjee (1991), Duncan and Pearson (1991), Fienberg (1994Fienberg ( , 2001, and Duncan, Fienberg, Krishnan, Padman, and Roehrig (2001), Abowd and Woodcock (2001), Kinney, Reiter, Reznek, Miranda, Jarmin, andAbowd (2011), andHu, Reiter, andWang (2014), among others.…”