How can we distinguish between genuine cybercrimes and “cyber-related” crimes?

How can we distinguish between genuine cybercrimes and “cyber-related” crimes? Please find and analyze a case or article to support your answer. 
Recall the case of Internet entrapment involving pedophiles that we described in Section 7.7.1. Which arguments can be made in favor of entrapment and “sting operations” on the Internet? From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences. Should sting operations be used to lure pedophiles? Justify your position by appealing to one or more of the ethical theories.
Min Pages: 2 
Other Requirements: Please cite this paper in APA Format:
(Author name, Year, Title and Publication)
Please do not Plagiarise, This paper will be submitted to plagiarsim check and I will get in trouble if you do.
Thanks

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now