II. TREATING CYBER CRIME DIFFERENTLY The author outlines strategies that may be used to tackle cyber crimes in light of their unique character.