Must security listen to Kokoro? | Publicación