2026/2027 KAN-CDIBV2604U Digital Sovereignty, AI & Resilient Infrastructures
| English Title | |
| Digital Sovereignty, AI & Resilient Infrastructures |
Course information |
|
| Language | English |
| Course ECTS | 7.5 ECTS |
| Type | Elective |
| Level | Full Degree Master |
| Duration | One Semester |
| Start time of the course | Autumn, Spring |
| Timetable | Course schedule will be posted at calendar.cbs.dk |
| Min. participants | 50 |
| Max. participants | 80 |
| Study board |
Study Board for Digitalisation, Technology and
Communication
|
| Programme | Master of Science (MSc) in Business Administration and Digital Business |
| Course coordinator | |
|
|
| Main academic disciplines | |
|
|
| Teaching methods | |
|
|
| Last updated on 11-03-2026 | |
Relevant links |
| Learning objectives | ||||||||||||||||||||||||
After completing the course, students should be
able to:
|
||||||||||||||||||||||||
| Course prerequisites | ||||||||||||||||||||||||
| Enrollment in a CBS graduate program (e.g., MSc
in Digital Business, EBA, or equivalent).
Familiarity with digital transformation and policy analysis is beneficial but not required. |
||||||||||||||||||||||||
| Examination | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
| Description of activities | ||||||||||||||||||||||||
|
Presentation(s):
Presentation
At least one group (of four or five students) presentation analyzing a case or presenting an article (e.g., digital infrastructure, AI, miltech, or sovereignty). Active and constructive participation in lectures, peer discussions, and practitioner Q&A sessions. Final Group Simulation / Policy Exercise: Participation in the final simulation exercise (Lecture 8), developing a strategic plan for European digital sovereignty in 2035.
A combination of
assignment and presentation: Short written or oral
reflections and multiple-choice mini-tests after each session (to
check comprehension and critical insight). Six out of 8 must be
approved.
Assignment(s):
In groups of four or five, students must be prepare a company
sovereignty analysis and strategy formulation. The report is
maximum 15 pages.
|
||||||||||||||||||||||||
| Course content, structure and pedagogical approach | ||||||||||||||||||||||||
|
This course examines how digital interdependence and
technological concentration shape Europe’s sovereignty,
competitiveness, and resilience.
Building on key theoretical frameworks—Keohane & Nye’s (1998) complex interdependence and Farrell & Newman’s (2019) weaponized interdependence—students explore how dependencies within global networks can be sources of both vulnerability and strategic power.
The course develops an applied understanding of how Europe can respond to asymmetric dependencies through AI investment, industrial strategy, and digital infrastructure innovation, as recommended in the Draghi Report (2024).
The course emphasizes interactive and applied learning through:
Content: The course addresses digital sovereignty as both a strategic and managerial challenge arising from deep global interdependence in digital infrastructures, platforms, and AI ecosystems. Drawing on theories of complex interdependence, weaponized interdependence, and soft and hard power, the course examines how digital dependencies can be transformed into sources of vulnerability, leverage, or resilience. A central analytical lens is the concept of tech stacks—the layered combination of hardware, software, data, platforms, and governance mechanisms that underpin modern organisations and societies. Students learn how sovereignty challenges emerge not at a single technological layer, but across interconnected stacks involving cloud infrastructure, data architectures, AI models, supply chains, and standards. The course shows how control over specific layers can generate power asymmetries, chokepoints, and strategic exposure. The course integrates dynamic capabilities theory to explain how organisations and governments can actively manage digital sovereignty over time. Rather than treating sovereignty as static independence, the course emphasises managerial capabilities to sense dependencies, seize strategic options, and reconfigure digital architectures in response to technological, regulatory, and geopolitical change. This perspective highlights sovereignty as an ongoing strategic process rather than a one-off technical decision. Throughout the course, students work with practical managerial guidelines for managing digital sovereignty in organisations and public institutions. These include:
Teaching is structured around a combination of lectures, student case presentations, and practitioner contributions, ensuring close integration between theory and real-world decision-making. Practitioner sessions provide insight into how digital sovereignty challenges are addressed in practice within firms, public authorities, and critical infrastructure providers. Learning is supported through structured reflection exercises and short learning tests, encouraging students to continuously integrate conceptual frameworks with empirical cases. The pedagogical approach emphasises analytical reasoning, strategic judgement, and applied problem-solving, preparing students to manage digital sovereignty challenges in both private and public sector contexts. |
||||||||||||||||||||||||
| Research-based teaching | ||||||||||||||||||||||||
|
CBS’ programmes and teaching are research-based. The following
types of research-based knowledge and research-like activities are
included in this course:
Research-based knowledge
Research-like activities
|
||||||||||||||||||||||||
| Description of the teaching methods | ||||||||||||||||||||||||
| The course comprises 8 sessions, each lasting 3
hours, combining theoretical lectures, student-led case
presentations, and practitioner input.
Each session follows this structure: • Recap & Lecture (60 minutes) • Student Presentation (45 minutes) • Practitioner Session (60 minutes) • Reflection & Learning Test (10 minutes) Teaching methods include lectures, case analysis, practitioner engagement, simulations, and in-class reflection tests. |
||||||||||||||||||||||||
| Feedback during the teaching period | ||||||||||||||||||||||||
| • Students receive continuous formative feedback
on presentations, reflections, and participation.
• Peer feedback is integrated during group exercises. • Instructor feedback focuses on conceptual understanding, analytical reasoning, and clarity of communication. |
||||||||||||||||||||||||
| Student workload | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
| Expected literature | ||||||||||||||||||||||||
|
Theoretical Foundations
Applied and Policy Context
Supplementary Sources
|
||||||||||||||||||||||||