Few scientists that specialize in information systems would recognize the name one of the field’s most cited authors, Ike Antkare. It is not that Antkare is from an obscure discipline. This aberration is the result of a vulnerability of citation analyses. A vulnerability proven with a computer program. Today, funding, promotion and tenure extension depend on the results of these analyses. This paper explores the nature of citation analyses in the information systems (IS) field and classifies them based on an adapted framework of Zupic and Cater (2015). The results illustrate two types of citation analyses. The first type contains ranking studies using measures of the h-family index calculated on citation networks. The second type involves co-citation analysis applying cluster or factor analysis to determine the intellectual structure, trajectory or maturity.