Submitted:
01 March 2026
Posted:
03 March 2026
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
2. Literature Review and Theoretical Framework
2.1. Traditional International Relations Theories
2.2. Emerging Theoretical Challenges
2.3. The Need for Theoretical Innovation
3. Methodology
3.1. Research Design and Philosophical Foundations
3.2. Data Collection and Analysis
3.3. Ethical Considerations
| Methodological Component | Approach | Rationale |
| Epistemology | Interpretivist | Recognizes socially constructed nature of IR phenomena |
| Ontology | Critical Realist | Acknowledges material and ideational dimensions |
| Research Design | Multi-method qualitative | Enables triangulation and comprehensive analysis |
| Primary Methods | Literature review, case analysis, policy analysis | Captures academic and policy perspectives |
| Analysis Technique | Thematic analysis | Flexible approach for identifying patterns |
| Quality Assurance | Audit trail, peer debriefing, member checking | Enhances trustworthiness of findings |
4. Research Domain Analysis
4.1. AI Governance and Global Power Dynamics
4.1.1. Research Gap Identification
4.1.2. Proposed Research Framework
| Research Dimension | Key Questions | Analytical Approach |
| Power Distribution | How does AI reshape relative capabilities? | Development of AI power indices |
| Alliance Politics | How do AI capabilities affect alliance structures? | Comparative case analysis |
| Technology Transfer | What strategic implications of AI-related transfers? | Policy document analysis |
| Security Dilemmas | Do AI capabilities create new security dilemmas? | Theoretical modeling |
| Governance Mechanisms | What governance structures emerge for AI? | Institutional analysis |
| Non-State Actors | What role do corporations play in AI power? | Network analysis |
4.2. Climate Security and Interstate Conflict
4.2.1. Research Gap Identification
4.2.2. Proposed Research Framework
| Security Dimension | Climate Factor | Potential Outcomes |
| Resource Competition | Water scarcity, agricultural stress | Conflict or cooperation over shared resources |
| Migration Pressures | Sea-level rise, extreme weather | Cross-border movement, regional instability |
| Territorial Change | Rising sea levels, Arctic opening | Sovereignty disputes, new shipping routes |
| Food Security | Agricultural disruption | Price volatility, civil unrest, trade conflicts |
| Cooperation Opportunities | Shared environmental challenges | Environmental peacemaking, institutional development |
| Securitization Dynamics | Climate as security threat | Policy changes, institutional adaptation |
4.3. Digital Sovereignty in the Global South
4.3.1. Research Gap Identification
4.3.2. Proposed Research Framework
| Model | Key Features | Representative Cases |
| State-Led Development | Government-driven digital infrastructure, local champions | China, Vietnam, Ethiopia |
| Regulatory Assertion | Strong data localization, privacy frameworks | India, Brazil, Indonesia |
| Strategic Hedging | Balancing engagement with multiple tech powers | Southeast Asian states, Kenya |
| Regional Integration | Collective digital infrastructure, shared standards | African Union, ASEAN |
| Open Digital Economy | Minimal restrictions, foreign investment focus | Singapore, Rwanda, UAE |
| Digital Non-Alignment | Autonomous positioning between tech powers | Brazil, South Africa, Mexico |
4.4. Non-State Actors and Hybrid Warfare
4.4.1. Research Gap Identification
4.4.2. Proposed Research Framework
| Non-State Actor Type | Hybrid Warfare Role | State Relationship |
| Private Military Companies | Kinetic operations, security services | Contract, delegation, proxy |
| Cyber Mercenaries | Offensive cyber operations | Implicit authorization, sponsorship |
| Media Networks | Influence operations, disinformation | Covert support, amplification |
| Economic Actors | Sanctions evasion, resource extraction | Facilitation, toleration |
| Proxy Forces | Irregular warfare, deniable operations | Training, equipping, directing |
| Platform Companies | Information control, data access | Regulation, cooperation, coercion |
5. Discussion
5.1. Theoretical Implications
5.2. Methodological Implications
5.3. Policy Implications
5.4. Cross-Domain Patterns and Interconnections
6. Limitations
7. Conclusion
7.1. Summary of Findings
8. Recommendations for Future Research
Funding Statement
Conflicts of Interest
Transparency
References
- Allied for Security. (2025). U.S. export controls and China: Advanced semiconductors and AI chips. Congressional Research Service. https://crsreports.congress.gov/product/R48642.
- Barnett, J. (2003). Security and climate change. Global Environmental Change, 13(1), 7-17. [CrossRef]
- Barnett, J., & Adger, W. N. (2007). Climate change, human security and violent conflict. Political Geography, 26(6), 639-655. [CrossRef]
- Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101. [CrossRef]
- Congressional Research Service. (2025). U.S. export controls and China: Advanced semiconductors and AI chips. CRS Report R48642. https://crsreports.congress.gov/product/R48642.
- Couture, S., & Toupin, S. (2019). Digital sovereignty: Steps towards the autonomy of a connected society. Internet Policy Review, 8(2), 1-17. [CrossRef]
- Cummings, M. L. (2017). Artificial intelligence and the future of warfare. Chatham House Research Paper. https://www.chathamhouse.org/sites/default/files/publications/research/2017-01-26-artificial-intelligence-future-warfare-cummings.pdf.
- European Centre for Development Policy Management. (2024). Global approaches to digital sovereignty: Competing definitions and contrasting policy approaches. ECDPM Discussion Paper. https://ecdpm.org/work/global-approaches-digital-sovereignty.
- Farrell, H., & Newman, A. L. (2019). Weaponized interdependence: How global economic networks shape state coercion. International Security, 44(1), 42-79. [CrossRef]
- Geneva Academy of International Humanitarian Law and Human Rights. (2024). Private military and security companies and their effects on conflict dynamics. Geneva Academy Briefing. https://geneva-academy.ch/publications.
- Hoffmann, M. J. (2019). The renaissance of constructivism in international relations. European Journal of International Relations, 25(4), 1061-1081. [CrossRef]
- Keohane, R. O., & Victor, D. G. (2011). The regime complex for climate change. Perspectives on Politics, 9(1), 7-23. [CrossRef]
- Maas, M. (2019). International law does not compute: Artificial intelligence and the development, destruction, and reconstruction of legal norms. Maryland Journal of International Law, 34(2), 185-222. https://digitalcommons.law.umaryland.edu/mjil/vol34/iss2/3.
- Mach, K. J., Kraan, C. M., Adger, W. N., Buhaug, H., Burke, M., Fearon, J. D., Field, C. B., Hendrix, C. S., Maystadt, J. F., O'Loughlin, J., Roessler, P., Scheffran, J., Schultz, K. A., & von Uexkull, N. (2019). Climate as a risk factor for armed conflict. Nature, 571(7764), 193-197. [CrossRef]
- Payne, K. (2021). Artificial intelligence: A new strategic reality. Parameters, 51(2), 19-30. [CrossRef]
- PLOS Climate. (2023). Climate change and security research: Conflict, securitisation and human agency. PLOS Climate, 2(5), e0000072. [CrossRef]
- Policy Center for the New South. (2025). Shaping a just digital order for the Global South. Policy Paper 38-25. https://www.policycenter.ma/sites/default/files/2025-10/PP_38-25.pdf.
- Reichborn-Kjennerud, K., & Olsen, K. T. (2019). Private military companies in hybrid warfare. Comparative Strategy, 38(3), 222-236. [CrossRef]
- Schwartz-Shea, P., & Yanow, D. (2012). Interpretive research design: Concepts and processes. Routledge. [CrossRef]
- Taylor & Francis. (2024). AI technologies and international relations. RUSI Journal, 169(3), 1-14. [CrossRef]
- TNO Defense Research. (2021). Non-state actors in hybrid conflicts and campaigns. TNO Report V1925. https://publications.tno.nl/publication/34640364.
- UNESCO Inclusive Policy Lab. (2024). Addressing digital colonialism: A path to equitable data governance. https://community.unesco.org/inclusivepolicylab/s/thinkpiece/addressing-digital-colonialism.
- Waltz, K. N. (2010). Theory of international politics. Waveland Press. (Original work published 1979). ISBN: 978-1577666707.
- Wiley Interdisciplinary Reviews. (2021). Climate mitigation policies and the potential pathways to conflict. WIREs Climate Change, 12(4), e722. [CrossRef]
- World Social Science Report. (2020). Climate change and international relations: A five-pronged approach. CSSN Working Paper. https://cssn.org/wp-content/uploads/2020/11/2020-ClimatechangeandIRafive-prongedapproach.pdf.
- ResearchGate. (2025). Global governance of artificial intelligence and great power rivalry: The conflict between market logic and security logic. Research Publication. https://www.researchgate.net/publication/397768789.
- Irregular Warfare Center. (2024). The role of non-state actors as proxies in irregular warfare and malign state influence. IWC Research Study. https://irregularwarfarecenter.org/publications/research-studies.
- Willy Brandt School of Public Policy. (2024). Models of state digital sovereignty from the Global South. Policy and Society, 43(1), 1-18. [CrossRef]
- International Journal of International Relations. (2023). Climate change and international relations theory: Northeast Asia as a case study. ResearchGate Publication. https://www.researchgate.net/publication/346491747.
- International Affairs. (2024). Climate change and peacebuilding: Sub-themes of an emerging agenda. International Affairs, 100(3), 1111-1130. [CrossRef]
- ScienceDirect. (2023). Climate change, international migration, and interstate conflict. Ecological Economics, 206, 107735. [CrossRef]
- PMC/NCBI. (2024). The impacts of climate change on violent conflict risk. PLOS ONE, 19(11), e0312345. [CrossRef]
- JSTOR. (2009). Qualitative research on norms and international relations. European Journal of International Relations, 15(4), 663-695. [CrossRef]
- University of Tehran. (2024). Artificial intelligence and the future of international law and power. World Society Studies, 14(2), 89-112. https://wsps.ut.ac.ir/article_103689.html.
- UNISCI Discussion Papers. (2025). Impact of the artificial intelligence on international relations and global governance. UNISCI Discussion Papers, 67, 1-28. https://www.unisci.es/wp-content/uploads/2025/01/UNISCIDP67-1GARRIDO.pdf.
- Trends Research. (2024). AI rivalries: Redefining global power dynamics. Trends Research Insight. https://trendsresearch.org/insight/ai-rivalries-redefining-global-power-dynamics.
- SSRN. (2025). Private military companies in international security. SSRN Electronic Journal. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5545820.
- Edward Elgar Publishing. (2024). Non-state actors and warfare. In Research Handbook on Modern Warfare (pp. 245-268). [CrossRef]
- Oxford University Press. (2023). Trapped in the grey zone: International law applicable to non-state actors. In The Oxford Handbook of International Law and Global Cyber Operations . [CrossRef]
- CIGI. (2024). Digital sovereignty in Africa: Moving beyond local data ownership. CIGI Policy Brief 185. https://www.cigionline.org/documents/2845/PB_no.185.pdf.
- T20 South Africa. (2025). From digital dependence to digital sovereignty: South Africa's G20 opportunity in the age of AI. T20 Commentary. https://t20southafrica.org/commentaries.
- Council on Foreign Relations. (2025). The new AI chip export policy to China: Strategically incoherent and unenforceable. CFR Analysis. https://www.cfr.org/articles/new-ai-chip-export-policy-china-strategically-incoherent.
- ResearchGate. (2025). Blockade and breakthrough: China-U.S. artificial intelligence technology competition under chip control policies. Research Publication. https://www.researchgate.net/publication/397494820.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).