Some Security Considerations on Crowd-Sourcing an Ontology