Hostname: page-component-54dcc4c588-scsgl Total loading time: 0 Render date: 2025-09-15T16:12:54.593Z Has data issue: false hasContentIssue false

‘The Conduct of Inquiry’ in ontological security studies: scientific methodologies and their implications

Published online by Cambridge University Press:  15 September 2025

Lukas Grundsfeld*
Affiliation:
https://ror.org/046ak2485Free University Berlin, Otto-Suhr Institute of Political Science, Center for International Relations, Berlin, Germany
Rights & Permissions [Opens in a new window]

Abstract

In recent years, ontological security studies (OSS) have developed an impressive breadth of empirical applications and depth of theoretical advancements. However, despite increasing disciplinary diversity, methodological differences in OSS and the resulting implications have not yet been discussed. Drawing on Jackson’s taxonomy of scientific methodologies, this article outlines that OSS is characterized by considerable methodological diversity cutting across existing distinctions in the field. Greater focus on this diversity is important, as (tacit) underlying methodological assumptions have significant implications concerning the types of knowledge claims that can be advanced. Providing the first systematic discussion of methodological questions in OSS, this article outlines the contours of grounding OSS in neopositivist, critical realist, reflexivist, and analyticist methodologies and provides examples thereof. It then discusses the implications emerging from different methodologies in terms of (1) the production and evaluation of valid knowledge claims about ontological (in)security, (2) the perception of and dealing with ontological and epistemological challenges in the concept of ontological (in)security, and (3) the critical potential of OSS. While highlighting the potential of OSS grounded in analyticism, this article ultimately emphasizes the inherent value of methodological pluralism structured around a common vocabulary enabling meaningful conversations – both within OSS and with International Relations more broadly.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2025. Published by Cambridge University Press

Introduction

Ontological security studies (OSS) represent a thriving research agenda in current International Relations (IR). Research based on the notion of ‘security as being’ and a ‘stable sense of self’Footnote 1 resembles the established pattern of early foundational and programmatic contributions,Footnote 2 followed by a proliferation of empirical applications and theoretical advancements. The latter include debates about the possibility of complete ontological (in)security,Footnote 3 the relationship between identity and the Self,Footnote 4 the relationship between anxiety and agency,Footnote 5 or the emancipatory potential of anxiety.Footnote 6 These advancements have been accompanied by increasing diversity in the field of OSS and the introduction of a broad number of distinctions,Footnote 7 for example, between approaches based in psychoanalysis,Footnote 8 sociology,Footnote 9 and existentialist philosophy,Footnote 10 more ‘mainstream’ or ‘critical’ contributions,Footnote 11 and strands primarily oriented toward IR’s conventional focus on states and those taking a more ‘vernacular’ perspective on societal groups and individuals.Footnote 12

However, while OSS has been divided and categorized in several ways, ‘none of these are successful at or sufficient or optimal for untangling the web of approaches identified in the literature.’Footnote 13 Existing distinctions in OSS obscure the fact that contributions differ in more fundamental respects, not primarily in terms of their basis in different intellectual traditions or their focus on different levels of analysis. In this paper, I bring into focus another dimension of differentiation within OSS: contributions to the field display considerable diversity in terms of the knowledge claims they produce about ontological (in)security. By this, I do not mean that contributions make different substantive claims about the origins, implications, role, and dynamics of ontological (in)security in world politics, which is, of course, the case. Instead, I argue that a so-far overlooked and more fundamental dimension of difference in OSS concerns the philosophical underpinnings of knowledge claims advanced. I am thus concerned with differences in OSS in terms of scientific methodology as a ‘concern with the logical structure and procedure of scientific inquiry.’Footnote 14 These methodological differences are more fundamental than and constitutive of debates about methods as the ‘techniques for gathering and analyzing bits of data.’Footnote 15

Drawing on fundamental philosophical wagers concerning the relationship between knower and known as well as between knowledge and observation, Patrick T. Jackson provides a taxonomy of four scientific methodologies: neopositivism, critical realism, reflexivity, and analyticism.Footnote 16 An overview of contributions to OSS over the past years reveals that within the field, knowledge claims grounded in all of these methodologies have been advanced. Neopositivist research seeks to produce knowledge about ontological (in)security by identifying covariations between causes of ontological (in)security, indicators of anxiety, and actions regarded as effects thereof. For example, Secen investigated correlations between the living conditions of refugees in different host countries and their strategies of ontological security seeking.Footnote 17 Critical realist contributions analyzed both ontological security seeking as an underlying causal mechanism accounting for observable outcomes, as well as the mechanisms through which ontological (in)security is generated and spread, for example, in the context of foreign policy decisions causing anxiety among citizens.Footnote 18 Reflexivist research on ontological (in)security used the concept as a tool or object of critique, as evident in Catarina Kinnvall’s analysis of the production of gendered ontological insecurities.Footnote 19 Finally, grounded in an analyticist methodology, ontological (in)security has also been used as an analytical ideal type that is deployed to produce insights into specific empirical situations. As an example, Tal Dingot Alkopher used different ideal-typified processes related to ontological security to analyze divergent reactions to migration in the European Union (EU).Footnote 20

At this stage, OSS is characterized by broad diversity in terms of the philosophical underpinnings of knowledge claims and the structures and procedures of scientific inquiry.Footnote 21 While I regard methodological diversity as one of the greatest strengths of OSS,Footnote 22 capitalizing on this strength requires greater clarity concerning the – often tacit – underlying ‘commitments and presuppositions’Footnote 23 from which research on ontological (in)security operates and in which it grounds its knowledge claims. Even though OSS has no shortage of extremely relevant theoretical debates, these questions have not yet been reflected upon. In this paper, I provide the first systematic discussion of scientific methodologies and especially of methodological diversity in the study of ontological (in)security. This is important for three reasons.

First, methodological assumptions determine the standards for the production and evaluation of valid knowledge claims. These are especially relevant for research on ontological (in)security, which often regards anxiety and ontological security seeking as a transhistorical constitutive element of the human condition,Footnote 24 or even as the constructivist equivalent of utility maximization in rational choice theory.Footnote 25 However, if everyone is always anxious and driven by ontological security seeking, for the concept to retain its utility, there must be clear standards for the evaluation of knowledge claims. While existing contributions proposed to address this issue by distinguishing between normal and extraordinary anxiety,Footnote 26 the ‘problem of codetermination’Footnote 27 requires a focus on the evaluation of knowledge claims – and thus on the methodological underpinnings of arguments.Footnote 28 Given the diversity of methodological positions in contributions to OSS, there exist considerable differences concerning the epistemological basis of knowledge claims advanced. Only a focus on scientific methodology and ‘the epistemic warrants to which it gives rise, can help us to determine the proper standards for evaluating … empirical claims’ by connecting philosophical foundations for the production of knowledge with substantive conclusions.Footnote 29 In effect, evaluating the validity of knowledge claims about ontological (in)security requires understanding the methodological position of a particular piece of research and the respective philosophical underpinnings of the knowledge claims it advances.

Second, the methodological frameworks in which contributions to OSS are grounded affect their dealing with two metatheoretical challenges inherent in the study of the concept of ontological (in)security, at least in the ‘traditional Laing–Giddens paradigm’ of ontological (in)security.Footnote 30 Studying ontological (in)security entails the ontological challenge of dealing with the actor’s Self, which a focus on the ‘security of the Self’ always risks to presuppose and reify as the starting point of its analysis. Epistemologically, OSS faces the challenge that while both the understanding of ontological (in)security as a fundamental condition and the structure of arguments about it incline toward regarding anxiety and ontological security seeking as real in an ontological sense, this requires an epistemological leap of faith. Methodological assumptions thereby structure how contributions to OSS perceive and deal with these metatheoretical challenges.

Third, methodological choices also affect the critical potential of OSS, as philosophical foundations determine the types of knowledge claims that can be made and thus the different forms of critique that can be advanced. Whether and how analysis is geared toward the production of critique depends very much on the assumed relationship between researcher, knowledge, and the world. Focusing on the different methodologies in which contributions to OSS are grounded thus contributes to a clearer understanding of how the concept of ontological (in)security can or cannot unfold its critical potential.

I proceed as follows: In the next section, I draw on Jackson’s taxonomy of scientific methodologies to illustrate the contours of research on ontological (in)security grounded in the respective methodologies and provide examples thereof. Following thereon, I outline the parameters and challenges for the production of valid knowledge claims about ontological (in)security within the different methodologies. Then, I draw on two metatheoretical challenges inherent in the conventional concept of ontological (in)security as focal points to discuss the metatheoretical implications of the respective methodologies. Finally, I review the critical potential of OSS grounded in the different methodologies. Throughout the analysis, I illustrate my arguments by drawing on the much-debated nexus between ontological (in)security and (far-right) populism.Footnote 31 In the concluding section, I highlight how these discussions contribute to more meaningful conversations both within OSS and between OSS and IR more broadly.

In this paper, I advance three main arguments. First, the diversity of the field of OSS in terms of underlying but tacit methodological assumptions has so far not been recognized. Second, a greater focus on this diversity is important since grounding OSS in different methodologies entails considerable implications concerning pivotal questions such as the evaluation of knowledge claims, dealing with metatheoretical challenges inherent in ontological (in)security, and concerning the concept’s critical potential. Third, while embracing the value of methodological pluralism in OSS, I highlight the potential of grounding research on ontological (in)security in an analyticist methodology.

The methodological diversity of OSS

Studying ontological (in)security, methodological questions matter. In this section, I provide an overview of the diversity of scientific methodologies in OSS. I thereby draw on the taxonomy of social scientific methodologies proposed by Jackson’s The Conduct of Inquiry in International Relations (see Table 1).Footnote 32 This taxonomy is based on the distinction between two fundamental wagers in philosophical ontology, neither of which can be definitely settled: the relationship between the knower and the known, and the relationship between knowledge and observation.Footnote 33

Table 1. Four scientific methodologies, taken from Jackson (Reference Jackson2011, 37)

The first wager distinguishes the positions of dualism and monism.Footnote 34 Mind-world dualism ‘maintains a separation between researcher and world such that research has to be directed toward properly crossing that gap.’Footnote 35 Valid knowledge must thus ensure the ‘accurate correspondence between empirical and theoretical propositions … and the actual character of a mind-independent world.’Footnote 36 In contrast, mind-world monism represents the idea that, as ‘“world” is endogenous to social practices of knowledge-production … speaking of “the world” as divorced from the activities of making sense of the world is literally nonsensical.’Footnote 37 The second wager addresses the question of whether knowledge is limited to empirically observable phenomena or if it can transcend toward ‘in-principle unobservable objects.’Footnote 38 The former position is labeled phenomenalism, the latter transfactualism.Footnote 39 Taken together, the two wagers delineate four scientific methodologies: neopositivism, critical realism, analyticism, and reflexivity.Footnote 40

For two reasons, I draw on Jackson’s taxonomy instead of more conventional differentiations, such as between positivism and non- or post-positivism,Footnote 41 positivism and interpretivism,Footnote 42 or explaining and understanding.Footnote 43 On the one hand, obscuring the differences between contrasting approaches, these distinctions represent a ‘less-than-useful classificatory scheme that does not really clarify the issues at stake in the philosophical distinction.’Footnote 44 Categorizing OSS through these conventional lenses thus brushes over fundamental differences in terms of methodology and often reduces them to questions of method.Footnote 45 On the other hand, these distinctions also obscure differences within the respective approaches, as they collapse the two axes of fundamental philosophical differences into a single differentiation. As a result, the positivism versus post-positivism distinction as commonly understood primarily refers to the diagonal axis between neopositivism and reflexivity, thereby leaving aside the other two quadrants. However, while critical realism, reflexivity, and analyticism could technically all be subsumed under the label of post-positivism, they have, in fact, very little in common. Distinctions such as positivism versus post-positivism or positivism versus interpretivism are thus too broad to identify and discuss the relevant underlying methodological differences between contributions to OSS and the implications emerging therefrom. As a result, I draw on Jackson’s taxonomy to refocus attention on the philosophical and methodological issues ‘at the heart of the distinction properly understood.’Footnote 46

Analyzing methodological implications for the study of ontological (in)security also requires reflecting on the underlying perspective on knowledge production in this paper. First, Jackson’s fundamental wagers represent ‘questions to which particular scholars give answers that depend, in the final analysis, on a measure of faith.Footnote 47 As these methodologies cannot be adjudicated from an external point of view, none of them is better or worse than another.Footnote 48 Therefore, in line with Jackson, I subscribe to a commitment to pluralism and epistemic tolerance as research should be evaluated for its ‘internal validity: whether, given our assumptions, our conclusions follow rigorously from the evidence and logical argumentation that we provide.’Footnote 49 Therefore, I refuse to judge between different methodologies and do not make a case against any of them.

Second, while every empirical issue can in principle be studied based on every methodology, scientific methodologies influence the questions that can reasonably be asked, the kind of knowledge that can possibly be produced, and the methods required, thus setting ‘the stage for the kinds of empirical and theoretical puzzles and challenges that a scholar takes to be meaningful and important.’Footnote 50 Thus, while I do not judge between different methodologies, I outline the implications of OSS based on different methodologies in terms of the knowledge claims that can be made, their metatheoretical implications, and their critical potential.

Third, while methodologies are the result of faith-based ‘wagers,’ it is my belief that these wagers can be deployed in a functional and even opportunistic way. Scientific methodologies are ‘sweaters, not skins.’Footnote 51 It is thus possible to purposefully choose between these wagers and place different bets at different points in time, and ‘there is no reason why a single published work cannot contain multiple independent arguments … drawn from different methodologies.’Footnote 52 In effect, accepting that as researchers we all resemble blind people trying to figure out the shape of the elephant ‘ontological (in)security,’Footnote 53 I regard accepting that there is no single best methodological approach to doing so as the most promising pathway for knowledge production.Footnote 54

In the following, I outline the basic parameters of research on ontological (in)security grounded in the different methodologies and provide examples thereof. This requires two caveats. On the one hand, I refer to contributions that I regard as typical examples and do not provide a conclusive or even exhaustive list of contributions to OSS associated with the respective methodology, which would go well beyond the scope of this paper. Instead, the purpose is to illustrate what grounding OSS in a specific methodology looks like. On the other hand, given the lack of explicit considerations about methodological questions, the allocation of contributions to the different methodologies is necessarily based on my exegetic reading of them. Thus, while some scholars might disagree with their categorization, I argue that the contributions display at least characteristics of the different methodologies.

Combining mind-world dualism and phenomenalism, neopositivism seeks to generate generalizable knowledge through the systematic testing and falsification of hypotheses based on the identification of empirical regularities or covariations and their subsumption under covering laws.Footnote 55 As neopositivist research reduces causality to covariation, explanations consist of ‘bringing prior observations of empirical regularities together with specific information about a particular situation and demonstrating that the outcome was to be expected.’Footnote 56 As valid claims ‘correspond to the (mind-independent) world,’ hypothesis testing is the ‘key neopositivist procedure’ to evaluate whether the conceptions in our minds in fact correspond with the world ‘out there.’Footnote 57

Within OSS, contributions grounded in neopositivism seek to establish empirical regularities concerning factors correlating with the occurrence of ontological (in)security, both as causes and effects. One example is Ofek Riemer,Footnote 58 who draws on a survey experiment in the context of Israeli foreign policy shifts to test hypotheses concerning the influence of states’ foreign policies on citizens’ sense of ontological (in)security. A similar research design is employed by Nimrod Rosler and Galia Press-Barnathan’sFootnote 59 assessment of whether international boycotts of cultural mega events cause ontological insecurity among citizens of the host state. Remaining at the individual level, Tianyang Liu et al.Footnote 60 analyze how measures of ontological (in)security in public surveys in different states correlate with threat perceptions of China. Similarly, Sefa Secen investigates covariations between the living conditions of Syrian refugees in Germany and Turkey and different strategies of ontological security seeking, as well as correlations between indicators of physical and ontological insecurity.Footnote 61

Critical realism, combining the wagers of mind-world dualism and transfactualism, presumes an independently existing world, while also claiming the existence of ‘real but unobservable’ entities, as the ‘mind-independent world is deeper than our perceptual experiences.’Footnote 62 This implies a stratified understanding of reality as only partly accessibleFootnote 63: ‘Underneath what we can perceive and detect lies a realm of real-but-undetectable “structures, powers, and tendencies” that give rise to the ordinary empirical sphere.’Footnote 64 In effect, our knowledge can go beyond experience and ‘grasp the deeper generative causal properties that give rise to those experiences.’Footnote 65 Critical realism thus differs from neopositivism’s focus on observable covariation and instead theorizes the existence of real but undetectable causal mechanisms, which have important effects in the perceivable part of the world.Footnote 66 Explanations thus leave behind deductive hypothesis testing and instead focus on abduction as the generation of plausible conjectures concerning underlying principles and factors from the observed phenomena.Footnote 67

Within OSS, several contributions display characteristics of a critical realist methodology. On the one hand, researchers abducted the unobservable causal mechanism of ontological security seeking as the best possible explanation behind empirically observable phenomena, such as the existence of materially non-beneficial regional integration efforts in the post-Soviet spaceFootnote 68 or the counterproductive pursuit of spheres of influence by self-perceived great powers.Footnote 69 Similarly, explaining the proliferation of private security companies in Europe despite increased safety, Elke Krahmann proposes ontological security provision through the identification, profiling, and management of risks as the underlying and unobservable causal mechanisms.Footnote 70 On the other hand, research focused on the unobservable processes underlying spatial and temporal dynamics of ontological (in)security. Drawing on the empirical case of securitization of migration in Serbia, Filip Ejdus and Tijana Rečević abduct that emergent processes generated through feedback loops and non-linear horizontal interactions at the micro level represent the conjecture providing the best explanation for the transformation of individual- into collective-level ontological (in)security.Footnote 71 Further, analyzing ontological insecurity in the Irish border region in the context of Brexit, Ben Rosher argues that ‘memories of the historically securitized and militarized border,’ projected ‘onto and vicariously through the next generation,’ represent the best possible explanation for the observable outcome of ‘intergenerational ontological insecurity.’Footnote 72 Similarly, Kathrin Bachleitner abducts temporal security seeking based on collective memories as the best way to ‘specify the precise details of how ontological security may work out as a process in states.’Footnote 73

Reflexivity denotes the combination of the wagers of mind-world monism and transfactualism.Footnote 74 As mind-world monism grounds knowledge production in the ‘concrete practical involvements’ of researchers, practices of knowledge production represent the ‘only feasible objects of transfactual knowledge.’Footnote 75 As a result, reflexivist research entails reflection and self-awareness toward ‘research practices and the broader context in which they are embedded’ through the application of the ‘tools of knowledge-production’ to the situations and practices of knowledge-production themselves.Footnote 76 This entails an understanding of knowledge as ‘both inseparable from and not in any simple sense reducible to the social position and organizational practices of the scientific researcher.’Footnote 77 However, the social relations in which the researcher is embedded are always and thoroughly imbued with power relations, which scientific knowledge, always being ‘for someone and for some purpose,’Footnote 78 either reproduces or destabilizes.Footnote 79 This is not an accidental byproduct but inextricably ‘wrapped up with the very production of knowledge in the first place.’Footnote 80 Reflexivity thus inclines researchers toward a ‘systematic effort to analyze their own role as knowledge-producers and to locate themselves with reference to their broader social contexts’ to produce knowledge about these social arrangements.Footnote 81

Reflexivist contributions, drawing – among others – on postcolonial,Footnote 82 gender,Footnote 83 or queerFootnote 84 perspectives, are prominent within OSS. On the one hand, these contributions employ ontological (in)security as a critical tool to ‘excavate… the presuppositions that implicitly inform the designation of certain kinds of worldly claims as knowledge.’Footnote 85 For example, they analyze how power structures and systems of oppression, such as neoliberal globalization,Footnote 86 the Western-dominated international order,Footnote 87 or power-infused ‘gendered spaces,’Footnote 88 produce ontological insecurity in the subjects they marginalize. On the other hand, contributions unveiled how ‘previously thought to be unbiased’ conceptions of ontological (in)security ‘have tacit biases,’Footnote 89 thus highlighting the marginalizing effects of dominant actors’ ontological security seekingFootnote 90 as it ‘disciplines or marginalizes modes of subjectivity which resist the closure of ontological security-seeking strategies.’Footnote 91 This is evident, for example, in the inherent exclusionary effects of states’ autobiographical narratives, which are gendered masculine and constituted upon the stigmatization of alternative narratives,Footnote 92 as well as in dominant narratives of global governance and transnationalism that maintain ontological security through the othering and securitization of subaltern actors.Footnote 93

Closely related to pragmatist perspectives in IR,Footnote 94 analyticism places its wagers on mind-world monism and phenomenalism. The mind-world monist rejection of Cartesian dualism locates knowledge neither in the mind nor the world but in the practices which mediate our access to the world.Footnote 95 The phenomenalist wager entails that knowledge cannot transcend experience but is always grounded in the concrete practices of knowledge production of communities of researchers.Footnote 96 This perspective is reflected in pragmatist perspectives embracing non-foundational epistemological and ontological positions.Footnote 97 While, from this perspective, scientific knowledge is always practical knowledge,Footnote 98 the intersubjective character of these experiences distinguishes the analyticist understanding of knowledge from notions of arbitrary subjectivity or crude idealism.Footnote 99 As a result, knowledge is a ‘social product,’Footnote 100 and a discipline such as IR represents a scholarly community of practice characterized by a ‘web of justified beliefs’Footnote 101 based on specific rules determining the (always temporal) acceptability of arguments.Footnote 102

If knowledge as a social product is located not in the world but in experiences organized through social practices, it should not be evaluated by its correspondence with the world but by the contribution that it makes, as experiences can be organized in more or less useful ways.Footnote 103 In this regard, scientific knowledge is generated by ‘systematically organizing experiences so as to generate useful insights.’Footnote 104 Analyticism thus relies on the process of ideal typification as a form of ‘disciplined ordering of the facts of experience.’Footnote 105 As ideal types are neither a representation of reality nor solely reducible to the researcher’s perspective,Footnote 106 this involves abstracting away from the details of individual experiences to instead create analytical tools through the instrumental oversimplification of value-based commitments into deliberate ‘caricatures’ or ‘conceptual filters.’Footnote 107 Since the value of an ideal type depends on its usefulness as ‘an appropriate means to the analytical end’ to make sense of concrete situations, ‘it is quite literally nonsensical to speak of an ideal-type as being “valid” or “invalid,”’ and ideal types can be discarded not ‘for being false, but for being useless.Footnote 108

An analyticist methodology is evident in a number of contributions to OSS. This is very explicit in Dingott Alkopher’s analysis of reactions to migration in the EU, which ‘builds a typology of three analytical ideal-type socio-psychological lenses’ to understand host societies’ dealing with migration-related uncertainty.Footnote 109 More implicit analyticist perspectives are already evident in foundational contributions to OSS in IR. For example, while Mitzen argued to regard states ‘“as if” they are ontological security-seekers,’Footnote 110 Steele conducted ‘an ontological security interpretation of British neutrality’ during the United States Civil War.Footnote 111 Analyticist characteristics can also be found in more recent contributions to OSS, asking whether the concept of ontological (in)security ‘helps us make sense of current global political trends.’Footnote 112 In this regard, Cingöz et al. ‘employ… the concept of ontological security … with the objective of elucidating [the] character and the underlying motivations’ concerning Iran’s ‘axis of resistance.’Footnote 113 Focusing on the effects of current developments in the cyber domain, Lupovici suggests ‘that the scholarship of ontological security … provides intriguing analytical tools’ and ‘a useful lens through which to consider the challenges [that] interactions in the cyber domain may create for states.’Footnote 114 Mitzen, again, argues that an ‘ontological security lens helps … in ways that potentially shed light on prospects for continued EU integration.’Footnote 115 Similarly, focusing on nineteenth-century Anglo-Afghan relations, Bayly states that from ‘an analytical perspective, … ontological security can bring to the surface relations between the “buffer state” and the neighbouring power.’Footnote 116 In effect, these contributions proceed from the idea that ‘the assumption that states are motivated by ontological security seeking … illuminates blind spots in existing works.’Footnote 117 However, contributions with more conceptual orientations also displayed characteristics of analyticist methodology. This is, for example, evident in Bolton’s analysis of the role of collective emotions and affect for ontological (in)security, arguing that ‘conceptualizing OS in relation to moral orders interrelated with the sacred provides a new optic through which to account for the dynamism of foreign policy.’Footnote 118 In a similar way, Verleye distinguishes several ideal-typical state shame narratives to create ‘a suitable and broad analytical tool for IR,’ which is able to produce ‘a thoughtful ordering of empirical reality.’Footnote 119

Valid knowledge claims

Scientific methodologies differ concerning their standards for the production and evaluation of valid knowledge claims. While standards for the evaluation of knowledge claims are generally important, this is especially the case for OSS, which reflects Berenskoetter’s call for deep theorizingFootnote 120 insofar as it understands anxiety and the search for ontological security as a transhistorical constitutive part of the human condition.Footnote 121 As Anthony Giddens argues, ‘to be ontologically secure is to possess … answers to fundamental existential questions which all human life in some way addresses,’Footnote 122 concerning issues such as existence, finitude, relations, and autobiography.Footnote 123 Similarly, drawing on existentialist philosophy, Felix Berenskoetter argued that as ‘a fundamental feature of this [human] condition is uncertainty[,] … anxiety enters our world once we become self-conscious and reflexive subjects,’ leading human beings to embrace a variety of ‘anxiety-controlling mechanisms.’Footnote 124 Also, for Lacanian contributions, ‘anxiety is an ever-present generator of agency.’Footnote 125 Given that ‘it seems fair to say that people have always lived with anxieties,’Footnote 126 the search for ontological security has been proposed as the constructivist equivalent of utility maximization in rational choice theory.Footnote 127

However, if anxiety and ontological security seeking represent constitutive elements of the human condition, every human action or interaction could in one way or another be seen as reflective of them. OSS thus encounters a problem similar to rational choice theory: Regarding actors as rational utility maximizers, whichever choice an actor made must have been rational from this point of view. However, to put it with Wendt, this always only appears in the rearview mirror.Footnote 128 In the same way, every action, including its opposite, could retrospectively be explained through the search for ontological security. Thus, while voting for populists represents an ontological security-seeking strategy, the opposite is equally true, as for some people, it is exactly voting against populists that stabilizes their ontological security. OSS thus faces the ‘problem of codetermination:’Footnote 129 if ‘everyone is anxious all the time, how do we account for differences in actor behavior?’Footnote 130

Drawing on existentialist accounts, several contributions proposed to address this problem by distinguishing between ‘normal feelings of anxiety,’ which are compatible with ontological security, and ontological insecurity as extraordinary neurotic anxiety.Footnote 131 I agree that the latter can neither be regarded as empirically prevalent nor as constitutive of the human condition in general.Footnote 132 I also agree with the critique against the often very loose ascription of ontological insecurity in empirical research.Footnote 133 However, as neurotic anxiety ‘is not what scholars of ontological security have in mind when they speak of ontological insecurity,’Footnote 134 and as ‘[n]ormal anxiety … is a necessary part of the human condition,’Footnote 135 separating between normal and extraordinary anxiety does not solve the problem of codetermination. Instead, this requires focusing on the evaluation of knowledge claims based on their methodological underpinnings.

Neopositivist methodology moves beyond the general assumption of ontological security seeking as a fundamental human condition to instead test propositions concerning factors which, under specified conditions, contribute to the ontological (in)security of actors with specific characteristics, as well as the effects emerging therefrom. The goal is thus the subsumption of increasingly fine-grained knowledge claims under generalizing laws. This would, for example, entail identifying covariations between factors that might contribute to anxiety, indicators of individual-level ontological insecurity, and support for populist parties. While it is at least questionable whether a concept such as ontological (in)security displays sufficient regularities in terms of its causes and effects to be able to produce knowledge claims generalizable under deductively generated laws, this is an empirical question.Footnote 136 However, the thornier problem relates to the issues of precise conceptualization and measurement of ontological (in)security for qualitative or quantitative comparative analyses aimed at identifying systematic covariations. On the one hand, this requires decisions, for example, about whether ontological (in)security is conceptualized as a continuous or binary variable and the underlying thresholds.Footnote 137 On the other hand, to make knowledge claims within the neopositivist framework, the indicators used to operationalize and measure ontological (in)security and its effects must be both valid and reliable. Thus, testing the hypothesis that anxious people are more inclined to vote for populists requires indicators that accurately measure individual-level ontological (in)security and not some other concept, and which do so regardless of the researcher conducting the study. Making knowledge claims about ontological (in)security that are valid within a neopositivist methodology is no trivial task.Footnote 138

For critical realism, producing valid knowledge claims about ontological (in)security requires establishing that ontological security seeking is not just some constitutive part of the human condition. Instead, the strive for ontological security must be explicitly established as a causal effect resulting from ontological insecurity and as the relevant – and ontologically real – causal force in specific contexts which ‘correspond to their innermost essence.’Footnote 139 Knowledge claims about ontological (in)security and its effects thus have to be evaluated in terms of ‘demonstrating that it is impossible to ignore,’ thereby connecting ‘undetectable causal powers with manifest actions and behaviors.’Footnote 140 This involves the formulation of arguments connecting a priori assumptions grounded in a common-sensical starting point through a series of ‘indispensability claims,’ which then allows applying these ‘causal powers’ to a specific empirical case.Footnote 141 For example, establishing anxiety and ontological security seeking as the real causal mechanism behind populist voting in a specific situation requires determining its role in a set of conditions which, while individually insufficient, in combination are sufficient (but not necessary) to produce this outcome.Footnote 142 Thus, a critical realist perspective demands the difficult task of ensuring that the theoretical accounts of ontological (in)security ‘accurately represent the causal powers actually possessed by [it] in the real world.’Footnote 143

From a reflexivist perspective, knowledge claims are not warranted through their external correspondence but through researchers’ systematic reflection about their role as knowledge producers in a broader social context and the knowledge claims present within it.Footnote 144 Reflexivist knowledge production thereby entails the twofold challenge of maintaining that its claims neither correspond to the world ‘out there’ nor are mere ‘partisan political interventions.’Footnote 145 It thus draws on pieces of knowledge and tacit assumptions present within specific social arrangements and relates them to their ‘function in reproducing a particular kind of social order.’Footnote 146 On the one hand, reflexivist researchers draw on knowledge within the ‘social arrangement’ of OSS to outline the biases inherent therein and the functions they fulfill,Footnote 147 arguing that ‘OSS has yet to confront its own complicity in broader racialized orders of knowledge.’Footnote 148 This entails, for example, the move from showing that states construct their sense of Self through biographical narrativesFootnote 149 toward outlining how these narratives uphold dominant social orders by marginalizing alternative perspectives.Footnote 150 On the other hand, reflexivist research draws on pieces of everyday knowledge within particular social groups to uncover their function in upholding the existing social order. For example, starting from the observation of ‘leave’ voters’ frustration both before and after the Brexit referendum, and systematizing this into an argument about the perpetually frustrated desire for wholeness helps to uncover how tacit assumptions within a particular social group contribute to the upholding of social order.Footnote 151 Thus, within a reflexivist methodology, the question is not how to evaluate knowledge claims based on the assumption of ontological (in)security as a constitutive human condition, but to reflect on the effects of this assumption as well as to use it in order to expose the effects of pieces of everyday knowledge.

An explicitly analyticist methodology provides a possibility to clarify the epistemological status of knowledge claims about ontological (in)security and to evaluate them. Deploying anxiety and ontological security seeking as analytical ideal types, they provide a ‘conceptual baseline’ against which to understand a concrete empirical case.Footnote 152 In this regard, ontological (in)security can be regarded as causal if, for example, in a counterfactual consideration, the occurrence of support for populism appears implausible in its absence.Footnote 153 However, this also implies that for ideal types to generate valuable knowledge, researchers must ‘acknowledge their limitations.Footnote 154 Exactly due to the one-sided over-accentuation and simplification entailed in the process of ideal-typification, ideal types necessarily and intentionally leave out ambiguities, opposing factors, or simply alternative perspectives, and no empirical situation is ever reducible to just one ideal type.Footnote 155 Thus, approaching empirical events through an ideal-type lens will always produce incomplete accounts.Footnote 156 In effect, while ideal types provide categories which help to generate and sort empirical observations, ‘it is those moments where the messy complexity of actual concrete experience resists such categorization that an analytical narrative takes off.’Footnote 157 Approaching an empirical situation through the ideal-type lens of ontological (in)security will most likely reveal aspects of the situation that it cannot make sense of, thus highlighting in which respects an ontological (in)security lens is not useful in the sense of ‘revealing intriguing and useful things about the objects to which it is applied.’Footnote 158 It could, for example, be the case that in specific situations, the analytical lens of ontological security seeking provides less insight into the populist voting behavior of people who do not appear to be ontologically insecure. Or, put differently, in some instances, the counterfactual consideration that people would still support populists if they were not anxious is also plausible. Enabling researchers to evaluate knowledge claims about ontological (in)security by recognizing their explanatory limits, analyticism provides researchers with a clearer understanding of its explanatory contributions. This encourages researchers to identify alternative and potentially conflicting ideal types to generate further insights into the empirical phenomenon.Footnote 159 Thus, ideal-typical analytical lenses such as socialization, habit, economic interest, or political culture may have greater analytical purchase in explaining support for populists in a specific empirical context.

Metatheoretical challenges

In this section, I draw on two metatheoretical challenges – at the level of ontology and epistemology – which research on ontological (in)security faces. While these metatheoretical challenges also occur in other strands of research, such as (international) political psychologyFootnote 160 or research on emotions in IR,Footnote 161 they have at least partly been debated within OSS. On the one hand, methodological considerations provide a new perspective on these debates. On the other hand, the challenges serve as useful focal points to discuss the metatheoretical implications of grounding OSS in different methodologies. While the metatheoretical challenges are inherent to research on the concept of ontological (in)security, at least in the conventional conception based on the psychoanalytical works of Ronald Laing and its sociological adaptation by Giddens, depending on the methodology, both the challenges and the way of addressing them differ significantly.

Research on ontological security faces the ontologicalFootnote 162 challenge of dealing with the actor’s Self, which a focus on the ‘security of the Self’ risks presupposing and reifying as the starting point of its analysis. This argument moves beyond the much-debated issue of transposing the psychological concept of ontological security to collectives such as states.Footnote 163 Instead, more fundamentally, the Self is inherent in the concept of ontological (in)security. As ‘the self … occupies a critically important terrain of analysis for OSS,’Footnote 164 this is the case regardless of the level of analysis. The ontological challenge is thus not that OSS treats states as personsFootnote 165 – which would not be a problem specific to OSSFootnote 166 – but that it risks to essentialize the Self of whichever actor it analyzes, regardless of the level of analysis, be it individuals,Footnote 167 societal groups,Footnote 168 states,Footnote 169 state–society complexes,Footnote 170 international organizations,Footnote 171 or the international community.Footnote 172

Within the conventional conception of ontological (in)security, researchers have pursued two main strategies to address this challenge. On the one hand, contributions sought to unpack the actor’s Self by moving beyond the presupposition of any specific substantive content, to instead point toward the openness of its construction.Footnote 173 Thereby, however, the Self remains the starting point and center of the analysis. On the other hand, scholars deconstructed the Self as the result of processes of ontological security seeking by other actors, usually at a ‘lower’ level of analysis. For example, understanding states’ identities as the result of multiple conflicting identifications and narrations attached to them by societal actors,Footnote 174 the analysis shifts toward the ontological security seeking of the different societal actors participating in this discursive process. However, moving beyond the state’s Self as the subject of ontological security to instead take as given the Self of these societal actors leads to a regress. The state’s Self is thus the result of ontological security seeking by societal groups, the societal groups’ Self the result of ontological security seeking by subgroups, and so forth, until reaching the level of the individual. At this point, the Self is either deconstructed from a Lacanian perspective (see below)Footnote 175 or finally essentialized. This, however, does not remove the ontological challenge as, ultimately ‘“the individual” is just as unobservable as the state is.’Footnote 176

Additionally, OSS also faces an epistemological challenge consisting of three aspects. First, ontological (in)security is not just an attribute of an actor but a very fundamental experience.Footnote 177 While identities and perceptions of security can be discursively constructed, an actor either has a stable sense of self, or they do not have it; either an actor experiences anxiety or it does not. Ontological (in)security, as the (absence of) a ‘stable sense of self,’Footnote 178 thus refers directly to an actor’s ‘real’ condition – not real in physical or material terms but in an ontological sense. OSS thus faces the challenge that it is inclined toward assuming that there is something ‘real’ behind the discourse.

Second, this is especially the case when deploying the concept of ontological (in)security in arguments about their (constitutive) causes and effects. In order to make arguments about the effects of social processes on an actor’s sense of ontological (in)security, or, conversely, the effects of ontological security seeking on the actor’s observable actions,Footnote 179 OSS thus entails a disposition toward assuming that actors are ontologically (in)secure or are driven by ontological security seeking. Claiming that people’s support for populist parties represents an attempt of ontological security seeking in response to anxieties induced through processes of globalization, this argument would not make sense if people were not really anxious due to globalization.

Third, however, this requires an epistemological leap of faith. This is most evident when focusing on ontological (in)security as a subjective conditionFootnote 180: ‘Since we cannot know what an actor actually experiences at any given moment, we have to infer their feelings and experiences from their behavior.’Footnote 181 However, there always remains ‘a large and significant epistemic gap between the observation of behavior and the conclusion that this behavior is the … motivated action … of an individual person.’Footnote 182 It is, at an epistemological level, quite impossible to know whether a person was really ontologically insecure and whether that was the reason behind their populist voting decision. However, the challenge also exists for strands of OSS that regard ontological (in)security as an intersubjective phenomenon in the form of collective emotions,Footnote 183 ‘public moods,’Footnote 184 or affective environments,Footnote 185 as it would require contrasting actors’ intersubjective reality to the researcher’s ‘objective’ reality. In other words, the epistemological basis for the statement that ‘we are in an age of anxiety’ is not at all clear.Footnote 186 As a result, OSS faces the challenge that the epistemological impossibility of differentiating between (inter)subjective constructions of ontological (in)security and both individual and collective actors’ real condition implies that the former is understood as the latter.Footnote 187

OSS grounded in different methodologies perceives of and deals with these metatheoretical challenges in different ways. Neopositivism, assuming that ‘we can never directly perceive a causal effect, and are limited to inferring it from our observations,’Footnote 188 enables OSS to ignore the metatheoretical challenges, as there is no reliable way to evaluate causation as such.Footnote 189 In effect, regarding causal relationships as ‘added onto the experience by the mind,’Footnote 190 neopositivism focuses solely on empirical covariations between indicators of anxiety and indicators of factors theorized as causes and effects thereof. It would thus, for example, be sufficient to test systematic covariations between hypothesized causes of anxiety, such as socioeconomic decline, psychological indicators of anxiety, and people’s populist voting choices. Methodologically, there is thus neither the possibility nor the requirement to go beyond this surface-level covariation to instead make assumptions about ontological realness or real causal effects. As a result, neopositivist OSS avoids the metatheoretical challenges as it can remain agnostic about the existence of actors’ Selves and whether ontological (in)security constitutes a real condition.

Critical realism enables scholars to tackle the metatheoretical challenges inherent in the concept of ontological (in)security head-on. Generating explanations based on the unobservable mechanism of ontological security seeking to account for observable phenomena, for this conjecture to exercise empirical effects, ‘it must be taken to be real, to actually exist, and thus to be something other than an instrumental theoretical convenience.’Footnote 191 Thus, if ontological (in)security provides ‘the best explanation for various puzzling things that we can see,’Footnote 192 it must be regarded as real insofar as it produces real effects.Footnote 193 In this regard, if anxiety and ontological security seeking can be conjectured as the best explanation for the populist voting behavior of individuals or societal groups, understanding as ontologically real both these actors’ Selves and their anxiety and ontological security seeking is not just possible but in fact necessary. OSS grounded in critical realism thus explicitly addresses the metatheoretical challenges.

Reflexivist OSS can ignore the metatheoretical challenges as its mind-world monist position renders any claims about actors’ Selves and their condition of ontological (in)security as ‘really’ existing in the world ‘out there’ nonsensical. More specifically, reflexivist contributions to OSS address the ontological challenge by drawing on non-essentialist notions of the Self and criticizing the biases inherent in its essentialization. For example, outlining the racialized colonial ordering functions and power dynamics inherent in the notion of the Self, Thomas Gehring proposed an ‘autopoetic’ conception of the Self and humanness as a praxis.Footnote 194 Reflexivist research on ontological (in)security has also drawn on the critical potential of Lacanian non-essentialist notions of the Self. These understand subjects as constituted ‘around a void’ and engaged in perpetually frustrated attempts to restitute their ‘primordial loss,’ thus rejecting the very ‘idea of a single, coherent, and unified subject.’Footnote 195 Lacanian accounts start from the assumption that subjects do not have pre-formed identities but are ‘impelled to engage in acts of identification, identifying with various socially inscribed signifiers’ that help them to generate a social identity in the form of a place in the social order and recognition through others.Footnote 196 However, as these signifiers are ‘embedded in preexisting social understandings, discourses, and practices of what being those things means,’ they always remain foreign to the subject.Footnote 197 As a result, being thrown into a world of alien structures of meaning, the ‘subject can never fully possess or “own” the signifiers it identifies with,’Footnote 198 thus rendering them perpetually insufficient to ground the subject’s Self-identity.Footnote 199 Subjects, therefore, subscribe to ‘fantasmatic narratives’ which display their desires for fulfilment and transform them into an empirical lack. This lack is both directed toward specific objects of desire and caused by them through their central position in the symbolic framework.Footnote 200 While these objects promise closure and fulfillment, ‘no empirical “object” can ultimately resolve the ontological lack and make us complete again’ rendering subjects in a continuous process of becoming.Footnote 201

On the one hand, reflexivist research on ontological (in)security deployed Lacanian perspectives concerning subjects’ strive for closure and completeness of the Self to unveil exclusivist and oppressive practices, including the appeal of populist discourses,Footnote 202 the racialized othering of migrants,Footnote 203 political homophobia,Footnote 204 or the persisting power dynamics emerging from shared desires between states and specific societal groups.Footnote 205 On the other hand, reflexivist OSS used Lacanian conceptions of the Self to criticize the marginalizing effect of power structures depriving subjects of complete and unified Selves. This is the case, for example, for post-colonial states, which in an international order characterized by post-colonial hierarchies can never achieve full recognition of the Self on their own terms.Footnote 206 In effect, reflexivist contributions to OSS address the ontological challenge by highlighting the biases in essentialist notions of the Self and the power dynamics in subjects’ strive for completeness, thus excluding conceptions of an ‘essentialized or pre-social self.’Footnote 207

This also holds implications concerning the epistemological challenge. As Lacanian arguments make ‘an ontological claim about the “real” nature of the individual self’Footnote 208 as being constituted by lack and driven by desires embedded in fantasies of wholeness, this would again require an epistemological leap of faith. However, reflexivist contributions to OSS are not concerned with the correspondence of knowledge to anything external and instead reflect upon the social-ordering effects of practices of knowledge production within OSS and specific social groups.Footnote 209 For example, focusing on anxiety in the EU, Thomas Diez and Franziskus von Lucke emphasize that their interest ‘is not about the degree to which the EU as such, or individuals in the EU, feel or are ontologically secure or insecure’ but about ‘how actors … articulate … and thus discursively construct the EU’s being and becoming.’Footnote 210 Additionally, reflexivist contributions to OSS outline, for example, how populist discourses always produce the anxiety that they then promise to alleviateFootnote 211 or how populist politics are motivated and sustained by desire as ‘our attachment to socially available “objects” pushes us to engage in practices through which social orders are reproduced.’Footnote 212 This focus on the effects of knowledge production enables reflexivist research on ontological (in)security to leave the epistemological challenge aside.

An analyticist methodology enables researchers to circumvent the metatheoretical challenges. On the one hand, analyticism evades the ontological challenge of the actors’ self. From a phenomenological perspective, OSS can bracket the question of whether a specific actor has or seeks to construct a self – and even if it represents an actor in the first place – to instead regard the entire empirical situation under an ‘as if’ assumption.Footnote 213 For example, regarding a societal group as an actor seeking to stabilize its Self by seeking to inscribe a certain narrative onto the state can generate useful insights into the group’s inclination to support populist politicians. Thereby, however, the ontological status of the actor’s self is irrelevant, and seeking to make statements about it is neither necessary nor useful. Instead, reifying or essentializing the actor’s Self as anything more than an analytical concept is not necessary for it to serve its explanatory function.Footnote 214 On the other hand, analyticism’s mind-world monist perspective allows moving around the epistemological challenge of OSS as scholars remain deliberately agnostic about whether ontological (in)security represents an actor’s real condition with real effects. The assumption that globalization causes anxieties which lead people to vote for populists promising to alleviate them provides valuable insights into the current populist ‘wave.’ However, from an analyticist perspective, the epistemological can of worms of the realness of these connections may remain closed since ‘as if’ assumptions suffice to produce these knowledge claims.Footnote 215 As a result, faced with metatheoretical challenges inherent in the concept of ontological (in)security, ‘[i]nstead of wading into a dense philosophical thicket and trying to fight their way through it,’ analyticism enables researchers to ‘simply go around … a set of non-issues.’Footnote 216 This, however, requires that analyticist research must be self-conscious of and explicit about its methodological positioning.

Critical potential

The critical potential of research on ontological (in)security depends on the scientific methodologies on which it is grounded. For contributions to OSS based on neopositivism and critical realism, the critical potential is limited due to their mind-world dualist grounding of knowledge claims in the real world, either in the form of a mirror image based on covariation or the uncovering of its deep and unobservable properties. Analyzing, for example, the correlation between socioeconomic decline and populist voting behavior, or the underlying mechanisms through which anxieties are caused and (potentially) alleviated in this process, both methodologies take the external world as a given. As a result, their critical potential remains limited to evaluating the results of the research. However, the normative argument that increasing socioeconomic inequality should be addressed to tackle support for populists is neither part of the analysis as such nor does it in any way necessarily follow from it.Footnote 217

While the critical potential of both analyticism and reflexivity is much greater due to their mind-world monist position, it differs significantly.Footnote 218 For analyticists, ideal-typified value commitments cannot be evaluated through empirical analysis, and disputes about them cannot be scientifically solved. In contrast, for reflexivists, the fact that the methods of knowledge production are not turned against these value commitments to make ‘themselves subject to further scientific critique’ is insufficient.Footnote 219 For example, even though from a reflexivist perspective ideal types could be fruitfully incorporated into critical discourse analysis, this would also require analyzing the researcher’s discursive embeddedness from which ideal types emerge.Footnote 220 As ‘knowing the world and changing the world are inseparable,’ the whole purpose of this endeavor of eliminating biases in knowledge production is ‘that a clearer view of things can be achieved,’ which may then open up possibilities for the non-arbitrary transformation of social conditions.Footnote 221 Uncovering, for example, that support for populist politics is connected to desires for closure and wholeness may provide the basis for inducing transformative change.Footnote 222

Analyticist OSS thus necessarily falls short of the reflexivist critical potential. However, this does not require forsaking all critical ambition. In IR, the relationship between pragmatist-analyticist perspectives and critical approaches has been somewhat diffuse: Pragmatism has been characterized as a strand of post-positivism,Footnote 223 as an alternative moving beyond both positivism and post-positivism,Footnote 224 as closely connected to critical theory,Footnote 225 and as the more relevant point of critique against theory-centered mainstream IR than post-positivism.Footnote 226 While this conundrum is somewhat representative of the ‘less-than-useful’ categorizations outlined above,Footnote 227 there are at least two ways in which critical potential can be integrated into analyticist OSS.

First, the value commitments underlying an ideal type do not have to be normatively desirable. Instead, ‘it is quite possible to acknowledge the scientific value of an ideal type, the value-laden basis of which one quite vehemently rejects’Footnote 228 and thereby to highlight and criticize the fact that a particular empirical situation appears to function according to the logic of this (negative) normative value. For example, showing that ideal-typical notions of people striving for homogeneity, closure, and coherence elucidate popular anti-immigratory sentiments does not mean to endorse them. Instead, as the outcome appears to be implausible in their absence, analyticist research contributes to critique by showing the very prevalence of (normatively undesirable) value commitments.

Second, analyticism entails an inclination toward reflection. Critics might argue that analyticist research inevitably reifies both the objects of study and the researcher’s (biased) value commitments deployed to them. In terms of the former, I argue that analyticism implies an agnostic position, enabling researchers to explicitly bracket questions concerning ontological realness. If made explicit and reflected upon concerning potential ‘lapses’ of ontological reification, this position differs from implicit (neopositivist) or explicit (critical realist) reification processes. Concerning value commitments, reflection is an inherent part of the process of ideal-typification, requiring the researcher to be explicit about the ethical claims transformed into ideal types. Outlining the biases, tacit assumptions, and silences inherent in the deployed ideal types demands the researcher ‘to be reflexive about her own categories used and the theories from which she thinks and acts,’Footnote 229 as well as their embeddedness in the social and discursive context.Footnote 230 This entails, for example, reflecting on the implications of analyzing populism primarily through the ideal type lens that people are generally anxious and driven by anxiety minimization, instead of the ideal typified value commitment of radical agency based on the embrace of anxiety.Footnote 231 In fact, some forms of (radical) support for populist politics, such as the January 6 attacks on the United States’ Capitol, might be better understood as attempts to claim radical agency through the embrace of uncertainty. These reflections about the ideal type value commitments deployed to empirical situations thus have the potential to elucidate biases in our analyses.

Moving beyond the potential for critique, analyticist research on ontological (in)security differs from reflexivist contributions in that it constitutes the methodological basis for a pragmatist-oriented normative turn in OSS, as proposed by Jason Ralph.Footnote 232 While there have been extensive debates about the conservative status quo bias inherent in understandings of ontological security as generated through closed identities and fixed routines,Footnote 233 according to Ralph, this is precisely the reason why the call to ‘embrace anxiety’ is not very appealing for many people.Footnote 234 Instead, drawing on pragmatist ethics, Ralph proposes a focus on improving people’s lived experiences in constantly changing environments. This perspective regards normative value not as substantive but as processual, located in the practice of learning and growth,Footnote 235 which may contribute to overcoming violent and exclusivist orders without abolishing all forms of order as such.Footnote 236 This pragmatist ethical perspective is constituted on an analyticist methodology in two ways.

On the one hand, focusing on the ability of agents to assert control over their experience of being entails that these questions can only be answered in specific contexts. Whether an actor’s situation-specific experience of being would improve through the continuation or adjustment of routines and identities cannot be answered in the abstract.Footnote 237 This resonates with analyticism’s phenomenological orientation, which generates knowledge about specific situations and the role that value commitments, such as inclinations for stability and openness for change, play in them, while recognizing that these insights do not have transfactual value. Identifying the role that ideal typical (non-)exclusionary value commitments play in a specific situation and the potential ways to improve people’s situation-specific experience of being without recurring, for example, to populist politics, analyticist OSS can thus contribute to learning and growth.

On the other hand, Ralph argues that the question concerning the possibility of nurturing healthy growth depends on a certain ‘faith’ in the functional value of thoughts:

We may one day learn that what we currently believe is in fact untrue, but in the meantime, belief can help us in a practical way … It can, for instance, help us to cope with uncertainty and to do things in that context…. Unverified claims “form the overwhelmingly large number of truths we live by.”Footnote 238

Thus, thoughts do not necessarily have to be true to be of practical value, e.g., by helping actors to overcome anxiety in a specific context.Footnote 239 This is reflective of the analyticist mind-world monist position, which recognizes the functional value of ideal-type ethical claims in producing insights about specific situations while rejecting both to securely ground these insights ‘within the world’ and to regard them as ‘true’ beyond their functional value. Grounding functional knowledge claims in value commitments which do not have to correspond to the world ‘out there,’ analyticist OSS provides the basis for learning processes whereby people’s situation-specific experience of being can be improved by focusing on the functional value of ethical commitments, for example, in overcoming exclusionary populist politics through processes of altercasting.Footnote 240

Conclusions

OSS represents an established research program in IR, characterized by broad empirical applications, thriving theoretical debates, as well as increasing diversity within the field. While this has led to the identification and distinction of different strands of OSS, relevant methodological differences have so far not been discussed. In this paper, I addressed this issue by drawing on Jackson’s taxonomy of scientific methodologies, thus advancing three main arguments.

First, OSS is characterized by broad methodological diversity in terms of the philosophical underpinnings of knowledge claims. Research on ontological (in)security has been grounded in neopositivist, critical realist, reflexivist, and analyticist methodologies, regarding the concept as a variable in systematic comparative analyses, an underlying although unobservable causal mechanism, an object of and tool for critical reflection, or an instrumentally deployed ideal type. This diversity of knowledge claims advanced in contributions to OSS cuts across existing distinctions within the field.

Second, greater reflection on scientific methodologies is important as different (implicit) philosophical foundations determine the types of knowledge claims advanced, their evaluation, their dealing with metatheoretical challenges, and their critical potential. While the understanding of anxiety and ontological security seeking as a constitutive human condition and the corresponding ‘problem of codetermination’Footnote 241 make standards for the evaluation of knowledge claims extremely relevant, this is not possible absent reflection on methodological assumptions, since scientific methodologies differ considerably in terms of their standards for the production and evaluation of valid knowledge claims. Additionally, grounding OSS in different methodologies also holds implications concerning the perception of and dealing with two metatheoretical challenges: the ontological risk of reifying the Self and the epistemological challenge following from the inclination to regard anxiety and ontological security seeking as ontologically real. Further, scientific methodologies also have important implications for the critical potential of OSS, which differs significantly depending on the philosophical foundation of the knowledge claims advanced.

Third, while I explicitly embrace the inherent value of methodological pluralism and of research based on the respective methodologies, in this paper, I sought to highlight the potential of grounding research on ontological (in)security in an analyticist methodology, which a variety of contributions to OSS already (tacitly) draw on. More specifically, analyticism provides both a promising possibility to evaluate the (limits of) knowledge claims advanced by OSS as well as a convenient pathway to circumvent the metatheoretical challenges. Moreover, while analyticist OSS falls short of the critical predisposition of reflexivity, it nonetheless entails critical potential and also moves beyond other critical approaches to OSS in that it undergirds a pragmatist-oriented normative turn in OSS.

Bringing into focus the methodological diversity of contributions to OSS and their effects, this paper complements and contributes to existing attempts to grapple with the diversity of the field. Just as IR more generally, which has been characterized by long-standing anxieties due to its ‘fragmentation of debates and research agendas … and diversity of methodologies,’Footnote 242 OSS has been described as an anxious research program ‘torn between embracing its unconventional roots … and engaging with the mainstream of IR scholarship to demonstrate its own legitimacy within the discipline.’Footnote 243 In this regard, as the concept of ontological (in)security has been applied to study ‘an ever-increasing range of phenomena in world politics’ and ‘different understandings and meanings of ontological security’ emerged, Hugo von Essen and August Danielson argue that there exists an increasing risk of the concept becoming ‘somewhat ambiguous’ and more ‘vague and less useful.’Footnote 244

On the one hand, this paper contributes to recent attempts to order the diversity in the field of OSS. Different strands of research on ontological (in)security have been distinguished according to their disciplinary roots,Footnote 245 ‘mainstream’ or ‘critical’ orientation,Footnote 246 or according to the levels and units of analysis focused on.Footnote 247 Similarly, von Essen and Danielson proposed a typology of ontological security mechanisms to ‘analyze, classify, and categorize the different understandings and meanings of ontological security in the literature.’Footnote 248 This paper does not substitute these efforts but complements them by providing a framework for understanding the methodological underpinnings of research on ontological (in)security and the resulting differences in terms of knowledge claims advanced, their validation, their dealing with metatheoretical challenges, and their implications for critique.

On the other hand, this paper seeks to facilitate and improve dialogue and debate within OSS. Given that ‘internal variety is arguably one of OSS’s greatest strengths, as it creates a vibrant research community characterized by theoretical openness and innovation,’Footnote 249 the field benefits from embracing its plurality based on ‘a sense of complementarity’ of different but internally justified bodies of knowledge.Footnote 250 The paper contributes to this strength by providing a ‘common vocabulary’ enabling researchers to evaluate the knowledge claims advanced and offering ‘a commonplace about which to disagree.’Footnote 251 This allows researchers to be ‘more cognizant of strengths and limitations of their ways of producing knowledge’Footnote 252 about ontological (in)security. Acknowledging and supporting the diversity of OSS, this paper enables different strands of the field to engage in more ‘productive dialogue’ and ‘meaningful scientific controversy.’Footnote 253 This entails, for example, discussions of methods and operationalizations in OSS, for which the methodological considerations in this paper provide a useful framework. Additionally, future research could also beneficially transfer these methodological discussions to other subfields, including international political psychologyFootnote 254 or research on emotions in IR.Footnote 255 The paper is thus not only relevant for researchers in OSS but also for scholars in adjacent fields and those from other fields of IR seeking to engage with arguments about ontological (in)security.

Acknowledgements

I presented parts of this paper at the EISA’s 2023 10th European Workshops in International Studies in Amsterdam. I thank Pelin Dengiz, Thomas Diez, Elena Dück, Nicolai Gellwitzki, Gabriella Gricius, Anne-Marie Houde, Nina Krickel-Choi, Oliver Merschel, Eric Pardo, Lauren Rogers, Ben Rosher, Franz von Lucke, Federico Salvati, Dominik Sipinski, Bruno Sowden-Carvalho, Sören Stapel, Pawel Tverskoi, Chris Vloedbeld, Leonardo Zanatta, as well as the editors and the three anonymous reviewers for valuable comments and suggestions for improving the paper.

Funding

No specific funding was received for this research.

Competing interests

The author declares none.

Footnotes

The paper title is, of course, a reference to Patrick T. Jackson’s The Conduct of Inquiry in International Relations: Philosophy of Science and Its Implications for the Study of World Politics (2011).

1 Kinnvall and Mitzen Reference Kinnvall and Mitzen2017, 4.

5 Berenskoetter Reference Berenskoetter2020; Flockhart Reference Flockhart2016; Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020.

6 Gustafsson Reference Gustafsson2021; Kinnvall and Mitzen Reference Kinnvall and Mitzen2020; Krickel-Choi Reference Krickel-Choi2022a; Rumelili Reference Rumelili2021; Zevnik Reference Zevnik2021. While recognizing the differentiation between ‘normal’ anxiety and pathological ontological insecurity (Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020, Krickel-Choi Reference Krickel-Choi2022a; see below for a further discussion of this distinction), I use both terms synonymously to improve readability.

7 Bolton Reference Bolton2023, 234–5; Rogers Reference Rogers2024, 193.

11 Rossdale Reference Rossdale2015.

12 Croft and Vaughan-Williams Reference Croft and Vaughan-Williams2017, 13.

13 von Essen and Danielson Reference von Essen and Danielson2023, 3.

14 Jackson Reference Jackson2011, 25.

15 Ibid., 25.

16 Ibid., 39.

18 Sofuoğlu, Sharani, and Ermihan Reference Sofuoğlu, Sharani and Ermihan2024.

19 Kinnvall Reference Kinnvall2017.

20 Dingott Alkopher Reference Dingott Alkopher2018.

21 Jackson Reference Jackson2011, 25.

22 Krickel-Choi Reference Krickel-Choi2022a, 5.

23 Jackson Reference Jackson2025, 136.

25 Flockhart Reference Flockhart2016.

26 Krickel-Choi Reference Krickel-Choi2022a; Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020.

27 Krickel-Choi Reference Krickel-Choi2022a, 11.

28 Jackson Reference Jackson2011, 190, 193.

29 Ibid., 194, 179.

30 Vulović and Ejdus Reference Vulović and Ejdus2024, 122; Steele Reference Steele2024, 3.

32 Jackson Reference Jackson2011.

33 Ibid., 34, 36–7.

34 Jackson Reference Jackson2008.

35 Jackson Reference Jackson2011, 35.

36 Ibid., 35.

37 Ibid., 35–6.

38 Ibid., 36.

39 Ibid., 37.

40 Ibid., 37.

42 Bevir and Hall Reference Bevir and Hall2020.

44 Jackson Reference Jackson2011, 36.

45 Ibid., 36; Jackson Reference Jackson2025, 98–9.

46 Jackson Reference Jackson2011, 36.

47 Ibid., 34, emphasis in the original.

48 Ibid., 31–2.

49 Ibid., 22, emphasis in the original; Jackson Reference Jackson2025, 133.

50 Jackson Reference Jackson2011, 34.

51 I hereby disagree with Furlong and Marsh’s (Reference Furlong, Marsh, Marsh and Stoker2010) claim that metatheoretical positions are ‘a skin, not a sweater.’

52 Jackson Reference Jackson2011, 207.

53 Puchala Reference Puchala1971.

54 Jackson Reference Jackson2025, 91.

55 Jackson Reference Jackson2011, 38, 64–5; Reference Jackson2025, 76.

56 Jackson Reference Jackson2011, 65.

57 Ibid., 44, emphasis in the original.

59 Rosler and Press-Barnathan Reference Rosler and Press-Barnathan2023.

60 Liu, Guan, and Yang Reference Liu, Guan and Yang2024.

62 Jackson Reference Jackson2011, 38, 104, emphasis in the original; see also Patomäki and Wight Reference Patomäki and Wight2000.

63 Jackson Reference Jackson2011, 93.

64 Ibid., 104.

65 Ibid., 74, 73.

66 Ibid., 74, 77.

67 Ibid., 74, 76, 79, 82–3; Kurki Reference Kurki2006.

68 Russo and Stoddard Reference Russo and Stoddard2018.

69 Lundström Reference Lundström2024.

70 Krahmann Reference Krahmann2018.

71 Ejdus and Rečević Reference Ejdus and Rečević2021.

72 Rosher Reference Rosher2022, 35.

73 Bachleitner Reference Bachleitner2023, 30.

74 Jackson Reference Jackson2011, 157.

75 Ibid., 157.

76 Ibid., 157, 167.

77 Ibid., 158.

78 Cox Reference Cox1981, 128, emphases in the original.

79 Jackson Reference Jackson2011, 159, 165.

80 Ibid., 159.

81 Ibid.

83 Delehanty and Steele Reference Delehanty and Steele2009.

84 Rossdale Reference Rossdale2015.

85 Jackson Reference Jackson2011, 169.

88 Kinnvall Reference Kinnvall2017.

89 Jackson Reference Jackson2011, 181.

91 Rossdale Reference Rossdale2015, 369.

93 Kinnvall and Svensson Reference Kinnvall and Svensson2017.

95 Jackson Reference Jackson2011, 114, 116, 122, 125.

96 Ibid., 140–2.

98 Jackson Reference Jackson2011, 135; Hamati-Ataya Reference Hamati-Ataya2012, 295.

99 Jackson Reference Jackson2011, 128–35.

100 Ibid., 123.

101 Rytövuori-Apunen Reference Rytövuori-Apunen2005, 150.

102 Friedrichs and Kratochwil Reference Friedrichs and Kratochwil2009, 712–3; Cochran Reference Cochran2002, 527; Kornprobst Reference Kornprobst2009.

103 Jackson Reference Jackson2011, 123, 126.

104 Ibid., 135.

105 Ibid., 114; Jackson Reference Jackson2025, 86; Cochran Reference Cochran2002, 536.

106 Diez Reference Diez1999, 64.

107 Jackson Reference Jackson2009; Diez Reference Diez1999, 63; Jackson Reference Jackson2011, 144–5.

108 Jackson Reference Jackson2011, 146, 144, 143, emphases in the original; Diez Reference Diez1999, 65.

109 Dingott Alkopher Reference Dingott Alkopher2018, 317.

110 Mitzen Reference Mitzen2006, 352.

111 Steele Reference Steele2005, 530.

112 Gülsah Çapan and Zarakol Reference Gülsah Çapan and Zarakol2019, 264–5.

114 Lupovici Reference Lupovici2023, 153, 168.

115 Mitzen Reference Mitzen2018, 410.

116 Bayly Reference Bayly2015, 820–1.

117 Oppermann and Hansel Reference Oppermann and Hansel2019, 79–80.

118 Bolton Reference Bolton2023, 258.

119 Verleye Reference Verleye2024, 42, 36.

120 Berenskoetter Reference Berenskoetter2018.

121 Zarakol Reference Zarakol2017; Rumelili Reference Rumelili2020; Brassett, Browning, and O’Dwyer Reference Brassett, Browning and O’Dwyer2021, 10.

122 Giddens Reference Giddens1991, 47.

123 Ejdus Reference Ejdus2018.

124 Berenskoetter Reference Berenskoetter2020, 275–6, 280.

125 Vulović and Ejdus Reference Vulović and Ejdus2024, 125.

126 Krickel-Choi Reference Krickel-Choi2022a, 15.

127 Flockhart Reference Flockhart2016.

128 Wendt Reference Wendt2001.

129 Krickel-Choi Reference Krickel-Choi2022a, 11.

130 Krickel-Choi Reference Krickel-Choi2021, 13.

131 Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020, 881–4; Krickel-Choi Reference Krickel-Choi2022a.

132 Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020, 881–2.

133 Ibid., 883.

134 Ibid., 883, 887; Krickel-Choi Reference Krickel-Choi2022a, 14.

135 Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020, 886. I thereby regard Laing’s understanding of normal anxiety as a default condition and the Lacanian perspective on individuals driven by constant desire for wholeness as pointing in the same direction (see also Krickel-Choi Reference Krickel-Choi2022a, 14–5).

136 Jackson Reference Jackson2011, 69.

137 Secen Reference Secen2024, 8.

139 Jackson Reference Jackson2011, 74; Reference Jackson2025, 87; Kurki Reference Kurki2007. The conception of causal effects in critical realism has often been labelled constitutive effects in IR (e.g., Wendt Reference Wendt1998). However, as Jackson argues, ‘[c]onstitutive relations are causal, albeit not causal in the neopositivist sense’ (Reference Jackson2011, 107).

140 Jackson Reference Jackson2011, 102, 108.

141 Ibid., 102–3.

142 Ibid., 199.

143 Ibid., 104, 110.

144 Ibid., 167–8; Hamati-Ataya Reference Hamati-Ataya2014, 153.

145 Jackson Reference Jackson2011, 169.

146 Ibid., 176, 178.

147 Ibid., 169.

148 Gehring Reference Gehring2023, 414.

149 Berenskoetter Reference Berenskoetter2014.

150 Innes Reference Innes2023.

151 Browning Reference Browning2019.

152 Jackson Reference Jackson2011, 144, 154, 159; Diez Reference Diez1999, 65.

153 Jackson Reference Jackson2011, 149.

154 Ibid., 154, emphasis in the original; Jackson Reference Jackson2025, 83.

155 Jackson Reference Jackson2011, 115, 143.

156 Ibid., 149; Jackson Reference Jackson2017.

157 Jackson Reference Jackson2011, 154, emphasis in the original.

158 Ibid., 146, 154, 115; Rytövuori-Apunen Reference Rytövuori-Apunen2009.

159 Diez Reference Diez1999, 65.

160 Gildea Reference Gildea2020.

161 Hutchison and Bleiker Reference Hutchison and Bleiker2014.

162 The term ‘ontological’ in ‘ontological (in)security’ refers to an actor’s ‘sense of self’ (Kinnvall and Mitzen Reference Kinnvall and Mitzen2017, 4). In contrast, when referring to ontological challenges, I use the term in a philosophy of science sense as referring to researchers’ assumptions about the nature of being or ‘what exists in the world’ (Jackson Reference Jackson2011, 26).

163 Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020.

164 Gehring Reference Gehring2023, 414.

165 Grzybowski Reference Grzybowski2022.

167 Nymalm Reference Nymalm2024.

168 Browning Reference Browning2019.

169 Kazharski Reference Kazharski2020.

170 Narozhna Reference Narozhna2020.

171 Mitzen Reference Mitzen2018.

172 Hom and Steele Reference Hom and Steele2020.

173 Krickel-Choi Reference Krickel-Choi2024.

175 Browning Reference Browning2019.

176 Jackson Reference Jackson2011, 90.

177 Gustafsson and Krickel-Choi Reference Gustafsson and Krickel-Choi2020.

178 Kinnvall and Mitzen Reference Kinnvall and Mitzen2017, 4.

179 von Essen and Danielson Reference von Essen and Danielson2023.

180 Pratt Reference Pratt2017, 79–80.

181 Krickel-Choi Reference Krickel-Choi2022a, 12.

182 Jackson Reference Jackson2011, 90, emphasis in the original.

183 Manners Reference Manners2024.

184 Rumelili Reference Rumelili2021.

186 Rumelili Reference Rumelili2021, 1021.

187 Krickel-Choi Reference Krickel-Choi2022a, 15.

188 Jackson Reference Jackson2011, 66–7.

189 Ibid., 61.

190 Ibid., 61, 64.

191 Ibid., 83, emphasis in the original.

192 Ibid., 79, emphasis in the original.

194 Gehring Reference Gehring2023, 419.

195 Browning Reference Browning2019, 229; Eberle Reference Eberle2019, 246; Epstein Reference Epstein2010, 335, 337. However, Lacanian arguments are not exclusive to reflexivity, but can, for example, also be embedded in critical realist or analyticist methodologies. An example of the latter is Ali and Whitham, who, analyzing the representation of Muslims in British public discourse, ‘construct a conceptual and analytic framework through Žižek’s Lacanian theory of ideology as a tool or heuristic’ (2018, 401).

196 Browning Reference Browning2019, 229–30; Eberle Reference Eberle2019, 246; Vieira Reference Vieira2018, 151; Epstein Reference Epstein2010, 336.

197 Browning Reference Browning2019, 230; Eberle Reference Eberle2019, 246.

198 Browning Reference Browning2019, 230, Epstein Reference Epstein2010, 336.

199 Browning Reference Browning2019, 230.

200 Ibid., 230; Eberle Reference Eberle2019, 246–7; Vulović and Ejdus Reference Vulović and Ejdus2024, 125–6.

201 Eberle Reference Eberle2019, 247.

203 Ali and Whitham Reference Ali and Whitham2018.

204 Bilgic Reference Bilgic2024.

205 Maitino and Vieira Reference Maitino and Vieira2024.

206 Vieira Reference Vieira2018; Bilgic and Pilcher Reference Bilgic and Pilcher2023.

207 Epstein Reference Epstein2010, 336.

208 Krickel-Choi Reference Krickel-Choi2022a, 15.

209 Jackson Reference Jackson2011, 167–8.

210 Diez and von Lucke Reference Diez and von Lucke2024, 4, emphases in the original.

211 Homolar and Scholz Reference Homolar and Scholz2019.

212 Eberle Reference Eberle2019, 246.

213 Jackson Reference Jackson2011, 118–9.

214 Ibid., 154.

215 Hellmann Reference Hellmann2009, 640.

216 Jackson Reference Jackson2011, 117.

217 Ibid., 199–200. The potential for critique in critical realism is thereby somewhat greater as the focus on unobservable properties may uncover both underlying structures of oppression and ‘as-yet-unrealized possibilities’ of emancipatory potential (ibid., 167).

218 Ibid., 178.

219 Ibid., 168–9, 178.

220 Diez Reference Diez1999, 64–6.

221 Jackson Reference Jackson2011, 160, 165–8.

222 Kinnvall and Svensson Reference Kinnvall and Svensson2023.

223 Cochran Reference Cochran2002.

224 Hamati-Ataya Reference Hamati-Ataya2012.

225 Bohman Reference Bohman2002.

226 Rytövuori-Apunen Reference Rytövuori-Apunen2005.

227 Jackson Reference Jackson2011, 36.

228 Ibid., 168–9.

229 Hofius Reference Hofius2020, 178, emphasis in the original.

230 Diez Reference Diez1999, 66; Jackson Reference Jackson2025, 85.

231 Berenskoetter Reference Berenskoetter2020.

232 Ralph Reference Ralph2024.

233 Ibid., 2.

234 Ibid., 4.

235 Ibid., 3–4; Owen Reference Owen2002, 669.

236 Steele Reference Steele2024.

237 Ralph Reference Ralph2024, 3–4.

238 Ibid., 5.

239 Ibid., 5.

240 Ibid., 6–7.

241 Krickel-Choi Reference Krickel-Choi2022a, 11.

242 Guzzini Reference Guzzini2020, 285.

243 Krickel-Choi Reference Krickel-Choi2021, 13; Croft and Vaughan-Williams Reference Croft and Vaughan-Williams2017.

244 von Essen and Danielson Reference von Essen and Danielson2023, 2, 3.

245 Bolton Reference Bolton2023, 234–5; Rogers Reference Rogers2024, 193.

246 Rossdale Reference Rossdale2015.

247 Croft and Vaughan-Williams Reference Croft and Vaughan-Williams2017

248 von Essen and Danielson Reference von Essen and Danielson2023, 2–3.

249 Krickel-Choi Reference Krickel-Choi2022a, 5.

250 Jackson Reference Jackson2011, 189, 210; Guzzini Reference Guzzini2020, 285.

251 Jackson Reference Jackson2011, 192–4, 210.

252 Ibid., 211, emphasis in the original.

253 Owen Reference Owen2002, 654; Jackson Reference Jackson2011, 39, 192, 194.

254 Gildea Reference Gildea2020.

255 Hutchison and Bleiker Reference Hutchison and Bleiker2014.

References

Agius, Christine, Rosamond, Annika Bergman, and Kinnvall, Catarina. 2020. “Populism, Ontological Insecurity and Gendered Nationalism: Masculinity, Climate Denial and Covid-19.” Politics, Religion & Ideology 21 (4): 432–50.CrossRefGoogle Scholar
Ali, Nadya, and Whitham, Ben. 2018. “The Unbearable Anxiety of Being: Ideological Fantasies of British Muslims Beyond the Politics of Security.” Security Dialogue 49 (5): 400–17.10.1177/0967010618794050CrossRefGoogle Scholar
Arfi, Badredine. 2010. “Fantasy in the Discourse of ‘Social Theory of International Politics’.” Cooperation and Conflict 45 (4): 428–48.CrossRefGoogle Scholar
Arfi, Badredine. 2020. “Security Qua Existential Surviving (While Becoming Otherwise) Through Performative Leaps of Faith.” International Theory 12 (2): 291305.10.1017/S1752971920000123CrossRefGoogle Scholar
Bachleitner, Kathrin. 2023. “Ontological Security as Temporal Security? The Role of ‘Significant Historical Others’ in World Politics.” International Relations 37 (1): 2547.10.1177/00471178211045624CrossRefGoogle Scholar
Bauer, Harry, and Brighi, Elisabetta. 2009. Pragmatism in International Relations. London: Routledge.10.4324/9780203885093CrossRefGoogle Scholar
Bayly, Martin J. 2015. “Imperial Ontological (In)Security: ‘Buffer States’, International Relations and the Case of Anglo-Afghan Relations, 1808–1878.” European Journal of International Relations 21 (4): 816–40.10.1177/1354066114557569CrossRefGoogle Scholar
Berenskoetter, Felix. 2014. “Parameters of a National Biography.” European Journal of International Relations 20 (1): 262–88.10.1177/1354066112445290CrossRefGoogle Scholar
Berenskoetter, Felix. 2018. “Deep Theorizing in International Relations.” European Journal of International Relations 24 (4): 814–40.CrossRefGoogle Scholar
Berenskoetter, Felix. 2020. “Anxiety, Time, and Agency.” International Theory 12 (2): 273–90.10.1017/S1752971920000111CrossRefGoogle Scholar
Bevir, Mark, and Hall, Ian. 2020. “The English School and the Classical Approach: Between Modernism and Interpretivism.” Journal of International Political Theory 16 (2): 153–70.10.1177/1755088219898883CrossRefGoogle Scholar
Bilgic, Ali. 2024. “Queering Ontological (In)Security: A Psychoanalysis of Political Homophobia.” Critical Studies on Security, 116. https://doi.org/10.1080/21624887.2024.2416302.CrossRefGoogle Scholar
Bilgic, Ali, and Pilcher, Jordan. 2023. “Desires, Fantasies and Hierarchies: Postcolonial Status Anxiety Through Ontological Security.” Alternatives: Global, Local, Political 48 (1): 319.10.1177/03043754221086170CrossRefGoogle Scholar
Bohman, James. 2002. “How to Make a Social Science Practical: Pragmatism, Critical Social Science and Multiperspectival Theory.” Millennium: Journal of International Studies 31 (3): 499524.10.1177/03058298020310030701CrossRefGoogle Scholar
Bolton, Derek. 2023. “The Unbearable Lightness of Being? Reconfiguring the Moral Underpinnings and Sources of Ontological Security.” International Theory 15 (2): 234–62.10.1017/S1752971922000173CrossRefGoogle Scholar
Brassett, James, Browning, Christopher, and O’Dwyer, Muireann. 2021. “EU’ve Got to Be Kidding: Anxiety, Humour and Ontological Security.” Global Society 35 (1): 826.10.1080/13600826.2020.1828298CrossRefGoogle Scholar
Browning, Christopher. 2018. “Brexit, Existential Anxiety and Ontological (In)Security.” European Security 27 (3): 336–55.10.1080/09662839.2018.1497982CrossRefGoogle Scholar
Browning, Christopher. 2019. “Brexit Populism and Fantasies of Fulfilment.” Cambridge Review of International Affairs 32 (3): 222–44.CrossRefGoogle Scholar
Browning, Christopher, and Joenniemi, Pertti. 2017. “Ontological Security, Self-Articulation and the Securitization of Identity.” Cooperation and Conflict 52 (1): 3147.10.1177/0010836716653161CrossRefGoogle Scholar
Cash, John. 2017. “The Dilemmas of Ontological Insecurity in a Postcolonising Northern Ireland.” Postcolonial Studies 20 (3): 387410.CrossRefGoogle Scholar
Cash, John. 2020. “Psychoanalysis, Cultures of Anarchy, and Ontological Insecurity.” International Theory 12 (2): 306–21.CrossRefGoogle Scholar
Cash, John, and Kinnvall, Catarina. 2017. “Postcolonial Bordering and Ontological Insecurities.” Postcolonial Studies 20 (3): 267–74.10.1080/13688790.2017.1391670CrossRefGoogle Scholar
Cingöz, Murat, Özkan, Fulya, Alkan, Yavuz Selim, and İzol, Ramazan. 2024. “Iran’s Axis of Resistance Through the Lens of Ontological Security.” Third World Quarterly 45 (13): 1963–80.10.1080/01436597.2024.2398613CrossRefGoogle Scholar
Cochran, Molly. 2002. “Deweyan Pragmatism and Post-Positivist Social Science in IR.” Millennium: Journal of International Studies 31 (3): 525–48.10.1177/03058298020310030801CrossRefGoogle Scholar
Cochran, Molly. 2012. Normative Theory in International Relations: A Pragmatic Approach. Cambridge: Cambridge University Press.Google Scholar
Cox, Robert W. 1981. “Social Forces, States and World Orders: Beyond International Relations Theory.” Millennium: Journal of International Studies 10 (2): 126–55.10.1177/03058298810100020501CrossRefGoogle Scholar
Croft, Stuart, and Vaughan-Williams, Nick. 2017. “Fit for Purpose? Fitting Ontological Security Studies ‘Into’ the Discipline of International Relations: Towards a Vernacular Turn.” Cooperation and Conflict 52 (1): 1230.10.1177/0010836716653159CrossRefGoogle Scholar
Delehanty, Will K., and Steele, Brent J.. 2009. “Engaging the Narrative in Ontological (In)Security Theory: Insights from Feminist IR.” Cambridge Review of International Affairs 22 (3): 523–40.10.1080/09557570903104024CrossRefGoogle Scholar
Diez, Thomas. 1999. Die EU Lesen: Diskursive Knotenpunkte in Der Britischen Europadebatte. Opladen: Leske + Budrich.10.1007/978-3-663-09696-2CrossRefGoogle Scholar
Diez, Thomas, and von Lucke, Franziskus. 2024. “Not Anxious Enough: The Discursive Articulation of Ontological Security in the European Parliament.” Review of International Studies, 119. https://doi.org/10.1017/S0260210524000640.CrossRefGoogle Scholar
Dingott Alkopher, Tal. 2018. “Socio-Psychological Reactions in the EU to Immigration: From Regaining Ontological Security to Desecuritisation.” European Security 27 (3): 314–35.10.1080/09662839.2018.1497981CrossRefGoogle Scholar
Eberle, Jakub. 2019. “Narrative, Desire, Ontological Security, Transgression: Fantasy as a Factor in International Politics.” Journal of International Relations and Development 22 (1): 243–68.CrossRefGoogle Scholar
Ejdus, Filip. 2018. “Critical Situations, Fundamental Questions and Ontological Insecurity in World Politics.” Journal of International Relations and Development 21 (4): 883908.10.1057/s41268-017-0083-3CrossRefGoogle Scholar
Ejdus, Filip, and Rečević, Tijana. 2021. “Ontological Insecurity as an Emergent Phenomenon: Bottom-up Securitization of Migration in Serbia.” European Psychologist 26 (1): 2944.CrossRefGoogle Scholar
Epstein, Charlotte. 2010. “Who Speaks? Discourse, the Subject and the Study of Identity in International Politics.” European Journal of International Relations 17 (2): 327–50.10.1177/1354066109350055CrossRefGoogle Scholar
Epstein, Charlotte. 2013. “Constructivism or the Eternal Return of Universals in International Relations: Why Returning to Language Is Vital to Prolonging the Owl’s Flight.” European Journal of International Relations 19 (3): 499519.10.1177/1354066113494669CrossRefGoogle Scholar
Flockhart, Trine. 2016. “The Problem of Change in Constructivist Theory: Ontological Security Seeking and Agent Motivation.” Review of International Studies 42 (5): 799820.10.1017/S026021051600019XCrossRefGoogle Scholar
Friedrichs, Jörg. 2009. “From Positivist Pretense to Pragmatic Practice: Varieties of Pragmatic Methodology in IR Scholarship.” International Studies Review 11 (3): 645–48.Google Scholar
Friedrichs, Jörg, and Kratochwil, Friedrich. 2009. “On Acting and Knowing: How Pragmatism Can Advance International Relations Research and Methodology.” International Organization 63 (4): 701–31.10.1017/S0020818309990142CrossRefGoogle Scholar
Furlong, Paul, and Marsh, David. 2010. “A Skin Not a Sweater: Ontology and Epistemology in Political Science.” In Theory and Methods in Political Science, edited by Marsh, David and Stoker, Gerry, 184211. London: Macmillan.10.1007/978-0-230-36664-0_10CrossRefGoogle Scholar
Gehring, Lucy. 2023. “The Autopoetics of the Self: A ‘Demonic’ Approach to Ontological Security Studies.” European Journal of International Security 8: 413–30.10.1017/eis.2023.13CrossRefGoogle Scholar
Giddens, Anthony. 1991. Modernity and Self Identity: Self and Society in the Late Modern Age. Cambridge: Polity.Google Scholar
Gildea, Ross James. 2020. “Psychology and Aggregation in International Relations.” European Journal of International Relations 26 (1_suppl): 166–83.10.1177/1354066120938830CrossRefGoogle Scholar
Grzybowski, Janis. 2022. “Separatists, State Subjectivity, and Fundamental Ontological (In)Security in International Relations.” International Relations 36 (3): 504–22.10.1177/00471178211045619CrossRefGoogle Scholar
Gülsah Çapan, Zeynep, and Zarakol, Ayşe. 2019. “Turkey’s Ambivalent Self: Ontological Insecurity in ‘Kemalism’ Versus ‘Erdoğanism’.” Cambridge Review of International Affairs 32 (3): 263–82.10.1080/09557571.2019.1589419CrossRefGoogle Scholar
Gustafsson, Karl. 2021. “Why Is Anxiety’s Positive Potential so Rarely Realised? Creativity and Change in International Politics.” Journal of International Relations and Development 24 (4): 1044–9.CrossRefGoogle Scholar
Gustafsson, Karl, and Krickel-Choi, Nina C.. 2020. “Returning to the Roots of Ontological Security: Insights from the Existentialist Anxiety Literature.” European Journal of International Relations 26 (3): 875–95.10.1177/1354066120927073CrossRefGoogle Scholar
Guzzini, Stefano. 2020. “Embrace IR Anxieties (Or, Morgenthau’s Approach to Power, and the Challenge of Combining the Three Domains of IR Theorizing).” International Studies Review 22 (2): 268–88.10.1093/isr/viaa013CrossRefGoogle Scholar
Hamati-Ataya, Inanna. 2012. “Beyond (Post)Positivism: The Missed Promises of Systemic Pragmatism.” International Studies Quarterly 56 (2): 291305.CrossRefGoogle Scholar
Hamati-Ataya, Inanna. 2014. “Transcending Objectivism, Subjectivism, and the Knowledge in Between: The Subject In/of ‘Strong Reflexivity’.” Review of International Studies 40 (1): 153–75.10.1017/S0260210513000041CrossRefGoogle Scholar
Hellmann, Gunther. 2009. “Beliefs as Rules for Action: Pragmatism as a Theory of Thought and Action.” International Studies Review 11 (3): 638–41.10.1111/j.1468-2486.2009.00889.xCrossRefGoogle Scholar
Hofius, Maren. 2020. “Towards a ‘Theory of the Gap’: Addressing the Relationship Between Practice and Theory.” Global Constitutionalism 9 (1): 169–82.10.1017/S2045381719000431CrossRefGoogle Scholar
Hollis, Martin, and Smith, Steve. 1990. Explaining and Understanding International Relations. Oxford: Clarendon Press.Google Scholar
Hom, Andrew R., and Steele, Brent J.. 2020. “Anxiety, Time, and Ontological Security’s Third-Image Potential.” International Theory 12 (2): 322–36.CrossRefGoogle Scholar
Homolar, Alexandra, and Scholz, Ronny. 2019. “The Power of Trump-Speak: Populist Crisis Narratives and Ontological Security.” Cambridge Review of International Affairs 32 (3): 344–64.10.1080/09557571.2019.1575796CrossRefGoogle Scholar
Hutchison, Emma, and Bleiker, Roland. 2014. “Theorizing Emotions in World Politics.” International Theory 6 (3): 491514.10.1017/S1752971914000232CrossRefGoogle Scholar
Huysmans, Jef. 1998. “Security! What Do You Mean?European Journal of International Relations 4 (2): 226–55.10.1177/1354066198004002004CrossRefGoogle Scholar
Innes, Alexandria. 2023. “Accounting for Inequalities: Divided Selves and Divided States in International Relations.” European Journal of International Relations 29 (3): 651672.10.1177/13540661231158529CrossRefGoogle Scholar
Jackson, Patrick T. 2004. “Hegel’s House, or ‘People Are States Too’.” Review of International Studies 30 (2): 281–7.10.1017/S0260210504006072CrossRefGoogle Scholar
Jackson, Patrick T. 2008. “Foregrounding Ontology: Dualism, Monism, and IR Theory.” Review of International Studies 34 (1): 129–53.10.1017/S0260210508007948CrossRefGoogle Scholar
Jackson, Patrick T. 2009. “Situated Creativity, Or, the Cash Value of a Pragmatist Wager for IR.” International Studies Review 11 (3): 656–9.Google Scholar
Jackson, Patrick T. 2011. The Conduct of Inquiry in International Relations: Philosophy of Science and Its Implications for the Study of World Politics. London: Routledge.Google Scholar
Jackson, Patrick T. 2017. “Causal Claims and Causal Explanation in International Studies.” Journal of International Relations and Development 20 (4): 689716.10.1057/jird.2016.13CrossRefGoogle Scholar
Jackson, Patrick T. 2025. Facts and Explanations in International Studies… And Beyond. Oxford: Taylor & Francis.Google Scholar
Joseph, Jonathan. 2007. “Philosophy in International Relations: A Scientific Realist Approach.” Millennium: Journal of International Studies 35 (2): 345–59.10.1177/03058298070350021401CrossRefGoogle Scholar
Kazharski, Aliaksei. 2020. “Civilizations as Ontological Security? Stories of the Russian Trauma.” Problems of Post-Communism 67 (1): 2436.CrossRefGoogle Scholar
King, Gary, Keohane, Robert O., and Verba, Sidney. 1994. Designing Social Inquiry: Scientific Inference in Qualitative Research. Princeton, NJ: Princeton University Press.10.1515/9781400821211CrossRefGoogle Scholar
Kinnvall, Catarina. 2004. “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security.” Political Psychology 25 (5): 741–67.10.1111/j.1467-9221.2004.00396.xCrossRefGoogle Scholar
Kinnvall, Catarina. 2017. “Feeling Ontologically (In)Secure: States, Traumas and the Governing of Gendered Space.” Cooperation and Conflict 52 (1): 90108.10.1177/0010836716641137CrossRefGoogle Scholar
Kinnvall, Catarina. 2018. “Ontological Insecurities and Postcolonial Imaginaries: The Emotional Appeal of Populism.” Humanity & Society 42 (4): 523–43.10.1177/0160597618802646CrossRefGoogle Scholar
Kinnvall, Catarina. 2019. “Populism, Ontological Insecurity and Hindutva: Modi and the Masculinization of Indian Politics.” Cambridge Review of International Affairs 32 (3): 283302.10.1080/09557571.2019.1588851CrossRefGoogle Scholar
Kinnvall, Catarina, and Mitzen, Jennifer. 2017. “An Introduction to the Special Issue: Ontological Securities in World Politics.” Cooperation and Conflict 52 (1): 311.10.1177/0010836716653162CrossRefGoogle Scholar
Kinnvall, Catarina, and Mitzen, Jennifer. 2018. “Ontological Security and Conflict: The Dynamics of Crisis and the Constitution of Community.” Journal of International Relations and Development 21 (4): 825–35.10.1057/s41268-018-0161-1CrossRefGoogle Scholar
Kinnvall, Catarina, and Mitzen, Jennifer. 2020. “Anxiety, Fear, and Ontological Security in World Politics: Thinking with and Beyond Giddens.” International Theory 12 (2): 240–56.10.1017/S175297192000010XCrossRefGoogle Scholar
Kinnvall, Catarina, and Svensson, Ted. 2017. “Ontological Security and the Limits to a Common World: Subaltern Pasts and the Inner-Worldliness of the Tablighi Jama’at.” Postcolonial Studies 20 (3): 333–52.10.1080/13688790.2017.1378080CrossRefGoogle Scholar
Kinnvall, Catarina, and Svensson, Ted. 2022. “Exploring the Populist ‘Mind’: Anxiety, Fantasy, and Everyday Populism.” The British Journal of Politics and International Relations 24 (3): 526–42.10.1177/13691481221075925CrossRefGoogle Scholar
Kinnvall, Catarina, and Svensson, Ted. 2023. “Trauma, Home, and Geopolitical Bordering: A Lacanian Approach to the COVID-19 Crisis.” International Studies Quarterly 67 (3): 111.10.1093/isq/sqad053CrossRefGoogle Scholar
Kirke, Xander, and Steele, Brent J.. 2023. “Ontological Security, Myth, and Existentialism.” Review of International Studies 49 (5): 905–23.CrossRefGoogle Scholar
Kornprobst, Markus. 2009. “International Relations as Rhetorical Discipline: Toward (Re-)Newing Horizons.” International Studies Review 11 (1): 87108.10.1111/j.1468-2486.2008.01826.xCrossRefGoogle Scholar
Krahmann, Elke. 2018. “The Market for Ontological Security.” European Security 27 (3): 356–73.10.1080/09662839.2018.1497983CrossRefGoogle Scholar
Kratochwil, Friedrich. 2007. “Of False Promises and Good Bets: A Plea for a Pragmatic Approach to Theory Building.” Journal of International Relations and Development 10 (1): 115.10.1057/palgrave.jird.1800111CrossRefGoogle Scholar
Krickel-Choi, Nina C. 2021. Rethinking Ontological Security Theory: Conceptual Investigations into ‘Self’ and ‘Anxiety’. Stockholm: Stockholm University.Google Scholar
Krickel-Choi, Nina C. 2022a. “The Concept of Anxiety in Ontological Security Studies.” International Studies Review 24 (3): 121.10.1093/isr/viac013CrossRefGoogle Scholar
Krickel-Choi, Nina C. 2022b. “The Embodied State: Why and How Physical Security Matters for Ontological Security.” Journal of International Relations and Development 25 (1): 159–81.10.1057/s41268-021-00219-xCrossRefGoogle Scholar
Krickel-Choi, Nina C. 2024. “State Personhood and Ontological Security as a Framework of Existence: Moving Beyond Identity, Discovering Sovereignty.” Cambridge Review of International Affairs 37 (1): 321.10.1080/09557571.2022.2108761CrossRefGoogle Scholar
Kurki, Milja. 2006. “Causes of a Divided Discipline: Rethinking the Concept of Cause in International Relations Theory.” Review of International Studies 32 (2): 189216.10.1017/S026021050600698XCrossRefGoogle Scholar
Kurki, Milja. 2007. “Critical Realism and Causal Analysis in International Relations.” Millennium: Journal of International Studies 35 (2): 361–78.10.1177/03058298070350021501CrossRefGoogle Scholar
Laing, Ronald D. 1960. The Divided Self: An Existentialist Study of Sanity and Madness. Harmondsworth: Penguin.Google Scholar
Lapid, Yosef. 1989. “The Third Debate: On the Prospects of International Theory in a Post-Positivist Era.” International Studies Quarterly 33 (3): 235–54.10.2307/2600457CrossRefGoogle Scholar
Lebow, Richard Ned. 2016. National Identities and International Relations. Cambridge: Cambridge University Press.10.1017/CBO9781316710982CrossRefGoogle Scholar
Lerner, Adam B. 2023. “Global Injustice and the Production of Ontological Insecurity.” European Journal of International Relations 30 (3): 595618.10.1177/13540661231219087CrossRefGoogle Scholar
Liu, Tianyang, Guan, Tianru, and Yang, Yilu. 2024. “Hobbled Across the Road: Ontological Securities, Security Values, and the Threat Perception of China in Australian, South Korean, and US Contexts.” Pacific Focus 39 (2): 395434.10.1111/pafo.12258CrossRefGoogle Scholar
Lundström, Magnus Hilding. 2024. “The ‘Geographical Here’ and the Pursuit of Ontological Security: Spheres of Influence Narratives and Great Power Identity in Times of Threatened Status.” Central European Journal of International and Security Studies 18 (4): 3358.10.51870/TZOG6552CrossRefGoogle Scholar
Lupovici, Amir. 2023. “Ontological Security, Cyber Technology, and Sates’ Responses.” European Journal of International Relations 29 (1): 153–78.CrossRefGoogle Scholar
Maitino, Martin, and Vieira, Marco. 2024. “Ontological Security and Climate Policy in Jair Bolsonaro’s Brazil: Understanding the Emotional Underpinnings of Environmental Destruction.” Global Studies Quarterly 4 (3): 113.10.1093/isagsq/ksae079CrossRefGoogle Scholar
Manners, Ian. 2024. “Political Psychology of Emotions in European Union Foreign Policy in Times of Ontological (In)Security and Crisis.” Journal of European Integration 46 (5): 817–37.10.1080/07036337.2024.2345608CrossRefGoogle Scholar
Mitzen, Jennifer. 2006. “Ontological Security in World Politics: State Identity and the Security Dilemma.” European Journal of International Relations 12 (3): 341–70.10.1177/1354066106067346CrossRefGoogle Scholar
Mitzen, Jennifer. 2018. “Anxious Community: EU as (In)Security Community.” European Security 27 (3): 393413.CrossRefGoogle Scholar
Narozhna, Tanya. 2020. “State–Society Complexes in Ontological Security-Seeking in IR.” Journal of International Relations and Development 23 (3): 559–83.10.1057/s41268-018-0164-yCrossRefGoogle Scholar
Naude, Bianca. 2022. Revisiting State Personhood and World Politics: Identity, Personality and the IR Subject. New York: Routledge.Google Scholar
Nymalm, Nicola. 2024. “Sustaining (Organizational) Identity in Times of Change? Ontological Security and Narrative in Swedish Military Doctrine.” Critical Military Studies 11 (2): 131–50.Google Scholar
Oppermann, Kai, and Hansel, Mischa. 2019. “The Ontological Security of Special Relationships: The Case of Germany’s Relations with Israel.” European Journal of International Security 4 (1): 79100.10.1017/eis.2018.18CrossRefGoogle Scholar
Owen, David. 2002. “Re-Orienting International Relations: On Pragmatism, Pluralism and Practical Reasoning.” Millennium: Journal of International Studies 31 (3): 653–73.10.1177/03058298020310030201CrossRefGoogle Scholar
Patomäki, Heikki, and Wight, Colin. 2000. “After Postpositivism? The Promises of Critical Realism.” International Studies Quarterly 44 (2): 213–37.10.1111/0020-8833.00156CrossRefGoogle Scholar
Pratt, Simon F. 2016. “Pragmatism as Ontology, Not (Just) Epistemology: Exploring the Full Horizon of Pragmatism as an Approach to IR Theory.” International Studies Review 18 (3): 508–27.10.1093/isr/viv003CrossRefGoogle Scholar
Pratt, Simon F. 2017. “A Relational View of Ontological Security in International Relations.” International Studies Quarterly 61 (1): 7885.Google Scholar
Puchala, Donald. 1971. “Of Blind Men, Elephants and International Integration.” Journal of Common Market Studies 10 (3): 267–84.Google Scholar
Ralph, Jason G. 2024. “Securing the Self, Embracing Anxiety, or Nurturing Growth? How the Pragmatism of Dewey, James, and Mead Speaks to Ontological Security Studies.” Global Studies Quarterly 4 (2): 111.10.1093/isagsq/ksae032CrossRefGoogle Scholar
Riemer, Ofek. 2023. “Foreign Policy and Citizens’ Ontological Security: An Experimental Approach.” The British Journal of Politics and International Relations 26 (2): 211–35.10.1177/13691481231218864CrossRefGoogle Scholar
Ringmar, Erik. 1996. “On the Ontological Status of the State.” European Journal of International Relations 2 (4): 439–66.10.1177/1354066196002004002CrossRefGoogle Scholar
Rogers, Lauren. 2024. “It’s Not EU, It’s We: Ontological Stress and French Narration of the Uprisings in Tunisia.” European Security 34 (2): 191209.CrossRefGoogle Scholar
Rosher, Ben. 2022. “‘And Now We’re Facing That Reality Too’: Brexit, Ontological Security, and Intergenerational Anxiety in the Irish Border Region.” European Security 31 (1): 2138.10.1080/09662839.2021.1949297CrossRefGoogle Scholar
Rosler, Nimrod, and Press-Barnathan, Galia. 2023. “Cultural Sanctions and Ontological (In)Security: Operationalisation in the Context of Mega-Events.” Cambridge Review of International Affairs 36 (5): 720–44.10.1080/09557571.2021.2018570CrossRefGoogle Scholar
Rossdale, Chris. 2015. “Enclosing Critique: The Limits of Ontological Security.” International Political Sociology 9 (4): 369–86.10.1111/ips.12103CrossRefGoogle Scholar
Rumelili, Bahar. 2020. “Integrating Anxiety into International Relations Theory: Hobbes, Existentialism, and Ontological Security.” International Theory 12 (2): 257–72.10.1017/S1752971920000093CrossRefGoogle Scholar
Rumelili, Bahar. 2021. “[Our] Age of Anxiety: Existentialism and the Current State of International Relations.” Journal of International Relations and Development 24 (4): 1020–36.10.1057/s41268-021-00226-yCrossRefGoogle Scholar
Russo, Alessandra, and Stoddard, Edward. 2018. “Why Do Authoritarian Leaders Do Regionalism? Ontological Security and Eurasian Regional Cooperation.” The International Spectator 53 (3): 2037.10.1080/03932729.2018.1488404CrossRefGoogle Scholar
Rytövuori-Apunen, Helena. 2005. “Forget ‘Post-Positivist’ IR!”. Cooperation and Conflict 40 (2): 147–77.10.1177/0010836705052240CrossRefGoogle Scholar
Rytövuori-Apunen, Helena. 2009. “Abstractive Observation as the Key to the ‘Primacy of Practice’.” International Studies Review 11 (3): 641–45.Google Scholar
Secen, Sefa. 2024. “Between Worlds: Ontological Security Among Syrian Refugees in Germany and Turkey.” Journal of Global Security Studies 9 (4): 118.10.1093/jogss/ogae040CrossRefGoogle Scholar
Shani, Giorgio. 2017. “Human Security as Ontological Security: A Post-Colonial Approach.” Postcolonial Studies 20 (3): 275–93.10.1080/13688790.2017.1378062CrossRefGoogle Scholar
Sofuoğlu, Nasuh, Sharani, Samer, and Ermihan, Erman. 2024. “The Self and the Other: Individual Emotions and Ontological Security in Turkish Foreign Policy.” Alternatives: Global, Local, Political, OnlineFirst. https://doi.org/10.1177/03043754241291121.CrossRefGoogle Scholar
Solomon, Ty. 2018. “Ontological Security, Circulations of Affect, and the Arab Spring.” Journal of International Relations and Development 21 (4): 934–58.10.1057/s41268-017-0089-xCrossRefGoogle Scholar
Steele, Brent J. 2005. “Ontological Security and the Power of Self-Identity: British Neutrality and the American Civil War.” Review of International Studies 31 (3): 519–40.10.1017/S0260210505006613CrossRefGoogle Scholar
Steele, Brent J. 2008. Ontological Security in International Relations: Self-Identity and the IR State. London: Routledge.10.4324/9780203018200CrossRefGoogle Scholar
Steele, Brent J. 2024. “Order and Justice in Ontological Security Studies.” Cooperation and Conflict 60 (2): 213–36.10.1177/00108367241288080CrossRefGoogle Scholar
Steele, Brent J., and Homolar, Alexandra. 2019. “Ontological Insecurities and the Politics of Contemporary Populism.” Cambridge Review of International Affairs 32 (3): 214–21.10.1080/09557571.2019.1596612CrossRefGoogle Scholar
Steele, Brent J., and Homolar, Alexandra. 2023. Ontological Insecurities and the Politics of Contemporary Populism. London: Routledge.10.4324/9781003375289CrossRefGoogle Scholar
Subotic, Jelena. 2016. “Narrative, Ontological Security, and Foreign Policy Change.” Foreign Policy Analysis 12 (4): 610–27.Google Scholar
Untalan, Carmina Yu. 2019. “Decentering the Self, Seeing Like the Other: Toward a Postcolonial Approach to Ontological Security.” International Political Sociology 14 (1): 4056.Google Scholar
Verleye, Zeger. 2024. “Failing the State Self: On the Politics of State Shame.” International Theory 17 (1): 2957.10.1017/S1752971924000101CrossRefGoogle Scholar
Vieira, Marco. 2018. “(Re-)Imagining the ‘Self’ of Ontological Security: The Case of Brazil’s Ambivalent Postcolonial Subjectivity.” Millennium: Journal of International Studies 46 (2): 142–64.10.1177/0305829817741255CrossRefGoogle Scholar
von Essen, Hugo, and Danielson, August. 2023. “A Typology of Ontological Insecurity Mechanisms: Russia’s Military Engagement in Syria.” International Studies Review 25 (2): 125.10.1093/isr/viad016CrossRefGoogle Scholar
Vulović, Marina, and Ejdus, Filip. 2024. “Object-Cause of Desire and Ontological Security: Evidence from Serbia’s Opposition to Kosovo’s Membership in UNESCO.” International Theory 16 (1): 122–51.10.1017/S1752971923000210CrossRefGoogle Scholar
Wendt, Alexander. 1998. “On Constitution and Causation in International Relations.” Review of International Studies 24 (5): 101–18.CrossRefGoogle Scholar
Wendt, Alexander. 2001. “Driving with the Rearview Mirror: On the Rational Science of Institutional Design.” International Organization 55 (4): 1019–49.10.1162/002081801317193682CrossRefGoogle Scholar
Wight, Colin. 2007. “Inside the Epistemological Cave All Bets Are Off.” Journal of International Relations and Development 10 (1): 4056.10.1057/palgrave.jird.1800109CrossRefGoogle Scholar
Wight, Colin. 2012. “Critical Realism: Some Responses.” Review of International Studies 38 (1): 267–74.CrossRefGoogle Scholar
Zanotti, Laura. 2015. “Questioning Universalism, Devising an Ethics Without Foundations: An Exploration of International Relations Ontologies and Epistemologies.” Journal of International Political Theory 11 (3): 277–95.10.1177/1755088214555044CrossRefGoogle Scholar
Zarakol, Ayşe. 2017. “States and Ontological Security: A Historical Rethinking.” Cooperation and Conflict 52 (1): 4868.10.1177/0010836716653158CrossRefGoogle Scholar
Zehfuss, Maja. 2002. Constructivism in International Relations: The Politics of Reality. Cambridge: Cambridge University Press.10.1017/CBO9780511491795CrossRefGoogle Scholar
Zevnik, Andreja. 2021. “Anxiety, Subjectivity and the Possibility of Emancipatory Politics.” Journal of International Relations and Development 24 (4): 1050–6.10.1057/s41268-021-00221-3CrossRefGoogle Scholar
Figure 0

Table 1. Four scientific methodologies, taken from Jackson (2011, 37)