Submitted:
03 April 2026
Posted:
08 April 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Literature Review and Theoretical Framework
2.1. Traditional International Relations Theories
| Theoretical Tradition | Core Assumptions | Strengths for Emerging Challenges | Key Limitations |
|---|---|---|---|
| Realism (Waltz, 1979; Mearsheimer, 2001) | Anarchy, state-centrism, power maximization | Explains great power AI competition, resource conflicts | Cannot accommodate non-state actors, digital power, or climate cooperation |
| Liberalism (Keohane, 1984; Ikenberry, 2011) | Institutions, interdependence, democratic peace | Explains governance regimes, cooperation incentives | Challenged by weaponized interdependence, institutional fragmentation |
| Constructivism (Wendt, 1999; Finnemore & Sikkink, 1998) | Norms, identity, social construction | Explains norm development, identity in digital spaces | Struggles with rapid tech change, algorithmic influence on social processes |
| English School (Bull, 1977; Buzan, 2014) | International society, institutions, order | Bridges material and normative, historical depth | Limited engagement with technology, non-state actors |
| Critical Theory (Cox, 1981; Linklater, 1998) | Power structures, emancipation, inequality | Addresses digital colonialism, Global South perspectives | Often lacks policy prescriptions, empirical specificity |
2.2. Emerging Theoretical Challenges
2.3. The Need for Theoretical Innovation
| Cross-Cutting Theme | AI Governance | Climate Security | Digital Sovereignty | Hybrid Warfare |
|---|---|---|---|---|
| Nature of Power | AI as dual-use power resource | Climate as structural power shift | Data as new currency of power | Ambiguity in power attribution |
| Actor Plurality | Tech corporations as power centers | NGOs, scientific bodies as actors | Platform companies, regional blocs | PMCs, cyber mercenaries, proxies |
| Domestic-International Nexus | Tech regulation, innovation policy | Local impacts, global governance | Data localization, digital rights | Influence operations, information war |
| Sovereignty Challenges | Algorithmic governance beyond borders | Climate-induced territorial loss | Transnational data flows | Deniable operations across borders |
| Norm Development | AI ethics, responsible use | Climate justice, common responsibility | Digital rights, data governance | Rules of engagement, attribution norms |
3. Methodology
3.1. Research Design and Philosophical Foundations
3.2. Data Collection and Analysis
3.3. Ethical Considerations
| Methodological Component | Approach | Rationale |
|---|---|---|
| Epistemology | Interpretivist | Recognizes socially constructed nature of IR phenomena |
| Ontology | Critical Realist | Acknowledges material and ideational dimensions |
| Research Design | Multi-method qualitative | Enable triangulation and comprehensive analysis |
| Primary Methods | Literature review, case analysis, policy analysis | Captures academic and policy perspectives |
| Analysis Technique | Thematic analysis (Braun & Clarke, 2006) | Flexible approach for identifying patterns |
| Quality Assurance | Audit trail, peer debriefing, member checking | Enhances trustworthiness of findings (Lincoln & Guba, 1985) |
| Scope | Four priority research domains | Balances depth and breadth of analysis |
| Data Sources | Academic databases, policy documents, think tank reports | Ensures comprehensive coverage of discourse |
4. Research Domain Analysis
4.1. AI Governance and Global Power Dynamics
4.1.1. Research Gap Identification
4.1.2. Proposed Research Framework
| Research Dimension | Key Questions | Analytical Approach |
|---|---|---|
| Power Distribution | How does AI reshape relative capabilities among states? | Development of AI power indices |
| Alliance Politics | How do AI capabilities affect alliance structures and cohesion? | Comparative case analysis |
| Technology Transfer | What are the strategic implications of AI-related technology controls? | Policy document analysis |
| Security Dilemmas | Do AI capabilities create new security dilemma dynamics? | Theoretical modeling |
| Governance Mechanisms | What governance structures emerge for AI at international level? | Institutional analysis |
| Non-State Actors | What role do corporations play in AI-driven power dynamics? | Network analysis |
| Norm Development | How do AI ethics norms emerge and diffuse internationally? | Process tracing |
| Initiative/Framework | Key Actors | Governance Focus | IR Implications |
|---|---|---|---|
| EU AI Act (2024) | European Union member states | Risk-based regulation, transparency | Regulatory power projection, Brussels Effect |
| U.S. Executive Orders on AI | United States federal government | Safety, security, innovation balance | Great power standard-setting |
| China’s AI Development Plan | Chinese government, state enterprises | Strategic development, military-civil fusion | Technology competition, power transition |
| OECD AI Principles | OECD member states | Responsible AI, human-centered values | Liberal norm diffusion |
| UNESCO AI Ethics Recommendation | 193 member states | Ethics, human rights, sustainability | Universal norm-building |
| G7 Hiroshima AI Process | G7 states | Responsible AI for advanced systems | Alliance-based governance |
4.2. Climate Security and Interstate Conflict
4.2.1. Research Gap Identification
4.2.2. Proposed Research Framework
| Security Dimension | Climate Factor | Potential Outcomes | Analytical Framework |
|---|---|---|---|
| Resource Competition | Water scarcity, agricultural stress | Conflict or cooperation over shared resources | Transboundary resource governance theory |
| Migration Pressures | Sea-level rise, extreme weather | Cross-border movement, regional instability | Migration-security nexus analysis |
| Territorial Change | Rising sea levels, Arctic opening | Sovereignty disputes, new shipping routes | Sovereignty and territorial integrity law |
| Food Security | Agricultural disruption, yield decline | Price volatility, civil unrest, trade conflicts | Food systems and political stability |
| Cooperation Opportunities | Shared environmental challenges | Environmental peacemaking, institutional development | Environmental peacebuilding theory |
| Securitization Dynamics | Climate as security threat | Policy changes, institutional adaptation | Copenhagen School securitization framework |
| Infrastructure Vulnerability | Extreme weather, flooding | Critical infrastructure failure, cascade effects | Resilience and adaptation governance |
4.3. Digital Sovereignty in the Global South
4.3.1. Research Gap Identification
4.3.2. Proposed Research Framework
| Model | Key Features | Representative Cases | Theoretical Implications |
|---|---|---|---|
| State-Led Development | Government-driven digital infrastructure, local champions | China, Vietnam, Ethiopia | State capacity and developmental state theory |
| Regulatory Assertion | Strong data localization, privacy frameworks | India, Brazil, Indonesia | Regulatory sovereignty and market power |
| Strategic Hedging | Balancing engagement with multiple tech powers | Southeast Asian states, Kenya | Alliance theory adapted to technology domain |
| Regional Integration | Collective digital infrastructure, shared standards | African Union, ASEAN | Regional governance and collective action |
| Open Digital Economy | Minimal restrictions, foreign investment focus | Singapore, Rwanda, UAE | Liberal economic integration theory |
| Digital non-alignment | Autonomous positioning between tech powers | Brazil, South Africa, Mexico | Non-alignment theory in digital context |
| Indicator | Sub-Saharan Africa | Southeast Asia | Latin America | Key Governance Challenge |
|---|---|---|---|---|
| Internet Penetration | ~40% | ~75% | ~75% | Access equity and digital divide |
| Local Data Center Capacity | Very limited | Growing | Moderate | Data sovereignty and localization |
| Domestic Platform Ecosystem | Nascent | Moderate | Moderate | Dependency on foreign platforms |
| Data Protection Legislation | Emerging (30+ countries) | Varied (ASEAN framework) | Moderate (LGPD in Brazil) | Regulatory capacity and enforcement |
| Digital Skills Workforce | Limited | Growing rapidly | Moderate | Human capital for technology governance |
| Regional Coordination | AU Digital Transformation Strategy | ASEAN Digital Masterplan | Limited regional frameworks | Collective bargaining power |
4.4. Non-State Actors and Hybrid Warfare
4.4.1. Research Gap Identification
4.4.2. Proposed Research Framework
| Non-State Actor Type | Hybrid Warfare Role | State Relationship | Governance Challenge |
|---|---|---|---|
| Private Military Companies | Kinetic operations, security services | Contract, delegation, proxy | Accountability, international humanitarian law |
| Cyber Mercenaries | Offensive cyber operations, surveillance | Implicit authorization, sponsorship | Attribution, jurisdiction |
| Media Networks | Influence operations, disinformation | Covert support, amplification | Free speech vs. information warfare |
| Economic Actors | Sanctions evasion, resource extraction | Facilitation, toleration | Financial regulation, transparency |
| Proxy Forces | Irregular warfare, deniable operations | Training, equipping, directing | International law, civilian protection |
| Platform Companies | Information control, data access | Regulation, cooperation, coercion | Content moderation, data sovereignty |
| Hacktivist Groups | Cyber disruption, data leaks | Opportunistic alignment, independence | Legal status, proportionality |
| Case Study | Primary Non-State Actors | Key Hybrid Dimensions | Attribution Challenges | Governance Responses |
|---|---|---|---|---|
| Ukraine conflict (2014–present) | PMCs, cyber groups, media networks | Military, cyber, information, economic | State denial of PMC involvement | Sanctions, international investigations |
| Sahel region conflicts | PMCs, proxy forces, extremist groups | Military, governance, resource control | Complex multi-actor environment | AU/ECOWAS frameworks, UN mandates |
| South China Sea tensions | Maritime militia, coast guard proxies | Gray zone operations, legal warfare | Civilian vs. military classification | UNCLOS proceedings, bilateral diplomacy |
| Information warfare campaigns | Social media networks, troll farms | Disinformation, election interference | Digital anonymity, cross-border operations | Platform policies, election security measures |
| Cyber operations (various) | Cyber mercenaries, hacktivist groups | Espionage, sabotage, theft | Technical attribution difficulties | Norms development, deterrence by punishment |
4.5. Emerging Technologies and Normative Order
4.5.1. Research Gap Identification
4.5.2. Proposed Research Framework
- Quantum technology governance: Comparison of national strategies (U.S., China, EU) and the role of international standard-setting bodies.
- Biotechnology and gene editing: Analysis of regulatory divergence, ethical debates, and the global diffusion of bioethics norms.
- Blockchain and digital identity: Examination of cross-border interoperability, privacy standards, and the emergence of decentralized governance models.
- Autonomous systems: Study of norm development in military and civilian applications, with attention to international humanitarian law and accountability mechanisms.
| Technology Domain | Key Actors | Governance Challenge | Normative Issues | Analytical Approach |
|---|---|---|---|---|
| Quantum Computing | States, tech corporations, standards bodies | Regulatory harmonization, dual-use risks | Security, privacy, economic competitiveness | Institutional analysis, process tracing |
| Biotechnology/Gene Editing | States, scientific communities, NGOs | Ethical regulation, cross-border transfer | Bioethics, human rights, safety | Comparative case analysis, norm diffusion |
| Blockchain/Digital Identity | States, tech firms, civil society | Interoperability, privacy, regulatory fragmentation | Data sovereignty, trust, inclusion | Network analysis, policy document review |
| Autonomous Systems | States, military, industry, advocacy groups | Accountability, legal adaptation | International law, proportionality, ethics | Process tracing, legal analysis |
| Synthetic Media/Deepfakes | Tech companies, media, governments | Disinformation, reputational risk | Free speech, authenticity, public trust | Content moderation policy analysis |
5. Discussion
5.1. Theoretical Implications
5.2. Methodological Implications
5.3. Policy Implications
5.4. Cross-Domain Patterns and Interconnections
| Domain Intersection | Key Linkages | Research Priority | Methodological Approach |
|---|---|---|---|
| AI Governance × Hybrid Warfare | Autonomous weapons, AI-enabled cyber operations, deepfakes | AI in conflict attribution and escalation dynamics | Case studies, simulation modeling |
| AI Governance × Climate Security | AI for climate modeling, environmental monitoring, resource optimization | AI applications in climate adaptation and conflict prevention | Interdisciplinary modeling |
| AI Governance × Digital Sovereignty | AI development dependency, algorithmic governance, data extraction | Technology dependency and AI capacity building in Global South | Comparative policy analysis |
| Climate Security × Digital Sovereignty | Environmental data governance, satellite monitoring, climate data ownership | Data sovereignty in climate science and governance | Multi-stakeholder analysis |
| Climate Security × Hybrid Warfare | Resource conflict, climate migration as destabilizer, weaponization of environmental data | Climate stress as catalyst for hybrid operations | Multi-level causal analysis |
| Digital Sovereignty × Hybrid Warfare | Information operations through platforms, cyber operations, digital surveillance | Platform governance and information warfare regulation | Network analysis, legal analysis |
6. Limitations
7. Conclusions
7.1. Summary of Findings
8. Recommendations for Future Research
| Recommendation | Implementation Strategy | Expected Outcome | Key Stakeholders |
|---|---|---|---|
| Develop new theoretical frameworks | Dedicated theory-building workshops, special journal issues | Updated conceptual tools for emerging challenges | Academic scholars, journal editors |
| Promote interdisciplinary research | Joint funding programs, cross-departmental centers | Integrated analysis across disciplinary boundaries | Universities, funding agencies |
| Connect research to policy | Regular researcher-policymaker forums, policy briefs | Better informed policy decisions | Academics, government officials, IOs |
| Build data infrastructure | Shared datasets, collaborative data collection | Enhanced comparative research capacity | Research institutions, professional associations |
| Include Global South perspectives | Inclusive research agendas, multilingual scholarship | Globally representative and valid scholarship | Global academic community, regional institutions |
| Adopt mixed-methods approaches | Methodological training, collaborative research designs | More robust and comprehensive findings | Graduate programs, research teams |
| Examine cross-domain interconnections | Integrated research programs, systems approaches | Understanding of systemic global challenges | Interdisciplinary research centers |
Funding
Conflicts of Interest
Transparency Statement
References
- Acharya, A. The end of American world order; Polity Press, 2014; ISBN 978-0745672472. [Google Scholar]
- Avant, D. D. The market for force: The consequences of privatizing security; Cambridge University Press, 2005. [Google Scholar] [CrossRef]
- Barnett, J. Security and climate change. Global Environmental Change 2003, 13(1), 7–17. [Google Scholar] [CrossRef]
- Barnett, J.; Adger, W. N. Climate change, human security and violent conflict. Political Geography 2007, 26(6), 639–655. [Google Scholar] [CrossRef]
- Bhaskar, R. A realist theory of science, 2nd ed.; Routledge, 2008. [Google Scholar] [CrossRef]
- Bradford, A. The Brussels effect: How the European Union rules the world; Oxford University Press, 2020. [Google Scholar] [CrossRef]
- Braun, V.; Clarke, V. Using thematic analysis in psychology. Qualitative Research in Psychology 2006, 3(2), 77–101. [Google Scholar] [CrossRef]
- Bull, H. The anarchical society: A study of order in world politics; Columbia University Press., 1977; ISBN 978-0231127639. [Google Scholar]
- Buzan, B. An introduction to the English School of international relations; Polity Press, 2014; ISBN 978-0745653167. [Google Scholar]
- Buzan, B.; Hansen, L. The evolution of international security studies; Cambridge University Press, 2009. [Google Scholar] [CrossRef]
- Buzan, B.; Wæver, O.; de Wilde, J. Security: A new framework for analysis; Lynne Rienner Publishers, 1998; ISBN 978-1555877842. [Google Scholar]
- Centre for International Governance Innovation. Digital sovereignty in Africa: Moving beyond local data ownership (CIGI Policy Brief No. 185). 2024. Available online: https://www.cigionline.org/documents/2845/PB_no.185.pdf.
- Congressional Research Service. U.S. export controls and China: Advanced semiconductors and AI chips (CRS Report R48642). 2025. Available online: https://crsreports.congress.gov/product/R48642.
- Couture, S.; Toupin, S. Digital sovereignty: Steps towards the autonomy of a connected society. Internet Policy Review 2019, 8(2), 1–17. [Google Scholar] [CrossRef]
- Cox, R. W. Social forces, states and world orders: Beyond international relations theory. Millennium: Journal of International Studies 1981, 10(2), 126–155. [Google Scholar] [CrossRef]
- Cummings, M.L. Artificial intelligence and the future of warfare . In Chatham House Research Paper; 2017; Available online: https://www.chathamhouse.org/sites/default/files/publications/research/2017-01-26-artificial-intelligence-future-warfare-cummings.pdf.
- Non-state actors and warfare. In Research handbook on modern warfare; Edward Elgar Publishing, 2024; pp. 245–268. [CrossRef]
- European Centre for Development Policy Management. Global approaches to digital sovereignty: Competing definitions and contrasting policy approaches ECDPM Discussion Paper. 2024. Available online: https://ecdpm.org/work/global-approaches-digital-sovereignty.
- Farrell, H.; Newman, A. L. Weaponized interdependence: How global economic networks shape state coercion. International Security 2019, 44(1), 42–79. [Google Scholar] [CrossRef]
- Finnemore, M.; Sikkink, K. International norm dynamics and political change. International Organization 1998, 52(4), 887–917. [Google Scholar] [CrossRef]
- Floridi, L. The fight for digital sovereignty: What it is, and why it matters, especially for the EU. Philosophy & Technology 2020, 33(3), 369–378. [Google Scholar] [CrossRef] [PubMed]
- Geneva Academy of International Humanitarian Law and Human Rights. Private military and security companies and their effects on conflict dynamics. Geneva Academy Briefing. 2024. Available online: https://geneva-academy.ch/publications.
- Gheciu, A.; Wohlforth, W. C. (Eds.) The Oxford handbook of international security; Oxford University Press, 2018. [Google Scholar] [CrossRef]
- Gleditsch, N. P. Whither the weather? Climate change and conflict. Journal of Peace Research 2012, 49(1), 3–9. [Google Scholar] [CrossRef]
- Hoffmann, M. J. The renaissance of constructivism in international relations. European Journal of International Relations 2019, 25(4), 1061–1081. [Google Scholar] [CrossRef]
- Homer-Dixon, T. F. Environment, scarcity, and violence; Princeton University Press, 1999; ISBN 978-0691089799. [Google Scholar]
- Horowitz, M. C. Artificial intelligence, international competition, and the balance of power. Texas National Security Review 2018, 1(3), 36–57. [Google Scholar] [CrossRef]
- Ikenberry, G. J. Liberal Leviathan: The origins, crisis, and transformation of the American world order; Princeton University Press, 2011; ISBN 978-0691156170. [Google Scholar]
- Irregular Warfare Center. The role of non-state actors as proxies in irregular warfare and malign state influence. IWC Research Study. 2024. Available online: https://irregularwarfarecenter.org/publications/research-studies.
- Kaldor, M. New and old wars: Organised violence in a global era, 3rd ed.; Polity Press, 2012; ISBN 978-0745655635. [Google Scholar]
- Keohane, R. O. After hegemony: Cooperation and discord in the world political economy; Princeton University Press, 1984; ISBN 978-0691122489. [Google Scholar]
- Keohane, R. O.; Victor, D. G. The regime complex for climate change. Perspectives on Politics 2011, 9(1), 7–23. [Google Scholar] [CrossRef]
- Lincoln, Y. S.; Guba, E. G. Naturalistic inquiry; Sage Publications, 1985; ISBN 978-0803924314. [Google Scholar]
- Linklater, A. The transformation of political community: Ethical foundations of the post-Westphalian era; Polity Press, 1998; ISBN 978-0745617459. [Google Scholar]
- Maas, M. International law does not compute: Artificial intelligence and the development, destruction, and reconstruction of legal norms. Maryland Journal of International Law 2019, 34(2), 185–222. Available online: https://digitalcommons.law.umaryland.edu/mjil/vol34/iss2/3.
- Mach, K. J.; Kraan, C. M.; Adger, W. N.; Buhaug, H.; Burke, M.; Fearon, J. D.; Field, C. B.; Hendrix, C. S.; Maystadt, J. F.; O’Loughlin, J.; Roessler, P.; Scheffran, J.; Schultz, K. A.; von Uexkull, N. Climate as a risk factor for armed conflict. Nature 2019, 571(7764), 193–197. [Google Scholar] [CrossRef] [PubMed]
- Mearsheimer, J. J. The tragedy of great power politics; W. W. Norton, 2001; ISBN 978-0393349276. [Google Scholar]
- Nye, J. S. The future of power; PublicAffairs, 2011; ISBN 978-1610390699. [Google Scholar]
- Payne, K. Artificial intelligence: A new strategic reality. Parameters 2021, 51(2), 19–30. [Google Scholar] [CrossRef]
- Policy Center for the New South. Shaping a just digital order for the Global South (Policy Paper 38-25). 2025. Available online: https://www.policycenter.ma/sites/default/files/2025-10/PP_38-25.pdf.
- Putnam, R. D. Diplomacy and domestic politics: The logic of two-level games. International Organization 1988, 42(3), 427–460. [Google Scholar] [CrossRef]
- Reichborn-Kjennerud, K.; Olsen, K. T. Private military companies in hybrid warfare. Comparative Strategy 2019, 38(3), 222–236. [Google Scholar] [CrossRef]
- Risse, T. “Let’s argue!”: Communicative action in world politics. International Organization 2000, 54(1), 1–39. [Google Scholar] [CrossRef]
- Scharre, P. Army of none: Autonomous weapons and the future of war; W. W. Norton, 2018; ISBN 978-0393356588. [Google Scholar]
- Schwartz-Shea, P.; Yanow, D. Interpretive research design: Concepts and processes; Routledge, 2012. [Google Scholar] [CrossRef]
- Singer, P. W. Wired for war: The robotics revolution and conflict in the 21st century; Penguin Books, 2009; ISBN 978-0143116844. [Google Scholar]
- TNO Defense Research. Non-state actors in hybrid conflicts and campaigns (TNO Report V1925). 2021. Available online: https://publications.tno.nl/publication/34640364.
- Waltz, K. N. Theory of international politics; (Original work published 1979); Waveland Press, 2010; ISBN 978-1577666707. [Google Scholar]
- Wendt, A. Social theory of international politics; Cambridge University Press, 1999. [Google Scholar] [CrossRef]
- Zuboff, S. The age of surveillance capitalism: The fight for a human future at the new frontier of power; PublicAffairs, 2019; ISBN 978-1610395694. [Google Scholar]
Author Bio
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).