Start with the question

We will work on the basis of the following question:
Elder abuse – physical, psychological, sexual abuse, neglect and/or  financial exploitation - is common but often underreported. Elder abuse can be a single, or repeated act, or may be a lack of appropriate action. The goal is to identify if specific programs or strategies are useful to prevent or reduce abuse in older people (60 years and over).

Step 1: Frame a PICO formatted question

Based on the above problem,  we have reframed the question as follows:
Compared with all other interventions, what is the effectiveness of X on elderly care professionals in reducing abuse of elders in care settings?
Here the PICO is defined as follows:

Step 2: Search literature & set selection criteria

We shall search only the  Pubmed database to identify relevant studies. You can find additional studies using other data bases. The databases that you will select will depend on the purpose of the study, and the nature of the research question you are working on. Ideally, you will search more than one database with a clear plan to identify the studies. 
In step two, we will also use the PICO terms and associated synonyms to select studies. For example, in our case, we might consider studies conducted on caregivers at aged care residential facilities, aimed at studying the impact of a programme aimed at reducing the elderly abuse. You will often get more studies than you need and therefore you will need to carefully continue to pare your search terms or arrange your search terms and algorithms till you arrive at a set of manageable set of results. Read the titles and abstracts of these studies first to identify a set of no more than five studies. Then, aim to abstract information from the five studies that you have selected to fill in the GRADE tables. We will provide an example of a single study from where we will abstract information and fill in the GRADE table in this paper. You will be able to follow the instructions to fill in more studies. 
The search algorithms are shown below in Table \ref{292235}