Theft as applied to new offenses in cyberspace

Theft as applied to new offenses in cyberspace (pp. 14-29)
Of those three existing tools (trespass, burglary, and theft), why is “theft” (and theft by “fraud”) the more likely choice to regulate these new offenses in cyberspace (unauthorized access, changing or deleting data, or denying access) (pp. 14-16)? What are the limitations of using “theft” to prevent “computer misuse” in cyberspace? (pp. 16-29).