Security Considerations about the Adoption of Web 2.0 Technologies in Sensitive e-Government Processes